Scorecards and Dashboards (in IT Risk Solutions)

Welcome! Please comment and leave me a note telling me what you like and what you'd like to see more of. Sign up to my RSS Feed!

After the success of “The Ostrich Syndrome“, Risk Management Executive asked me to write another article.  This time I chose to speak on something near and dear to my heart: the need for executive dashboards to know how much better (or worse) they are doing today vs. last year.  Here it is, as appeared in June 2005:


Scorecards and Dashboards

The business world today faces two, often conflicting, demands for security.  The first is Return-on-investment (ROI) and the other is compliance.  Whereas compliance is regulation driven, ROI is the reason-d’être of business.  Any business.

When we approach risk management, we must consider several techniques that we can use.  We can use risk avoidance which is a technique based on early recognition of potential risk.  We can use risk mitigation, which is a method to handle risk once we realize we have that specific risk.  Finally, we can also use risk management which really is an over-arching term used to describe various ways to address risk.  The common thread here, between all these methods, is that we must realize that the Risk exists and we must address it (one way to address it is to ignore it, but that’s not why YOU are reading this newsletter.)

In business, however, Risk is most welcome.  Risk is the way business gets done and Risk is the way Rewards are obtained.  We all know the adage “nothing ventured, nothing gained”.  So, frequently business invites risk upon itself in order to grow and become more profitable.

In order for the business executive to make the right decision, he or she must know their organization’s position with regard to risk (risk tolerance), its current exposure to risk, and the potential rewards and penalties that might be derived from that risk.

We, as Business Executives with risk mitigation responsibility have a unique opportunity.  The opportunity we have is that with today’s technology we can tie our enterprise’s current exposure – both ROI and compliance driven – to an automated system that can present to us our true Risk Exposure at any given moment and that can track our exposure over time.

Such a tool could be numerical (We are at a “7” today vs. “6” last year), report card-format (We get a B Plus today), or graphical.  Such a tool can also compare and contrast systems, sites, organizations, departments and processes.  This tool can offer histograms, which help track where little change brought a lot of risk or, conversely, a great ROI.  Finally, such a tool can be used to justify investment in our tools, processes and training.

If your organization does not have such a unified risk management tool, there are four first steps that will help you begin the process to achieve it:

  1. Assemble your Key Performance Indicators (KPI’s.)  These are the measurements that you and your organization are responsible to provide
  2. Decide on the frequency you would like the details available (annual vs. monthly vs. daily vs. hourly vs. to the minute) and in what format (graphical? Numerical?)
  3. Decide who needs access to the information – is it only you?  Is it your superiors? Your direct reports?
  4. Include the three items above in your goals list for this project.


In the next article, we will discuss how to build such tools, how to make sure that they communicate with other systems in the data center, and how to derive information from them in a realistic and dependable manner.

Ariel Silverstone,  Director at the Office of the CTO at Symantec and formerly the Chief Information Security Officer for Temple University, is a frequently requested speaker and avid writer.

He has been involved in the computer industry for over 17 years, contributed to over 30 published books and has consulted nationally and internationally for Fortune 1000 firms on the implementation of management information systems and networking systems. Over the years, he has designed and set up hundreds of networks , including using all versions of Windows, Netware and many flavors of Unix.