Summary
The current cybersecurity climate for organizations is fraught with danger and risk. To avoid incurring excessive expenses, organizations are proactively managing security by monitoring key metrics. This chapter has presented the most crucial measures that organizations should keep an eye on.
This chapter has also looked at the most valuable metrics that any firm should record to get better insights about its security stature and ability to contain attackers, such as phishers. The first group of metrics helps gauge the prevalence of the attack in the organization. The second group of metrics covers the effectiveness of the IR process, and lastly, the all-encompassing metric that can help the organization get an overall picture of individual phishing attacks is the timeline, which records events preceding, during, and following an attack.
Each of these metrics will give the organization hindsight about phishing incidents and help it bolster its security stature to repel...