19 essential KPIs to track your information security program's effectiveness

19 Essential KPIs to Track Your ISMS’s Effectiveness

List of universal KPIs and metrics to measure the progress and effectiveness of any information security management program.

GRC KPIs Checklist

GRC Metrics & KPIs Checklist with Example KPIs

Checklist for choosing KPIs for GRC program with Example KPIs

Risk Management Fail: Mixing Causes with the Risk Itself

People often mix up the risk itself with its potential cause or mitigation. This mistake can significantly impact how risks are understood and managed.

Illustration of a farm together with the post title

NIS 2 Just Came Out But We Already Know What NIS 3 Will Bring

In 7-8 years, my dad’s dairy farm and other “normal” non-techy companies will need to have formal information security programs. Here’s why: The World Economic Forum (WEF) has been publishing their Cybersecurity Outlook reports since 2022. In the latest 2025

Vendor drift

The Highest Vendor Risk Happens AFTER Onboarding: Vendor Drift

The Biggest Vendor Risk Happens AFTER Onboarding: Introducing Vendor Drift with strategies for discovery and mitigation.

Illustration of scales to illustrate the idea of hidden biases in risk scoring

Choosing the Right Risk Matrix: Hidden Biases and How to Overcome Them

Overview of hidden biases in risk scoring and practical ways to overcome them.

Company

Follow Us