Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2004

Best practices for security report writing

All corporate reporting roads lead to the corner office. C-level executives are flooded with reams of data and business intelligence: sales figures, operations status checks, inventory counts, financials and stock reports, facility records and so on. To an executive, security reports just add to the stack of paper. Framing the "security message" in this environment requires a delicate balance between too much and too little detail. It's an oversimplification to say that execs only want to know, "Are we secure?" But at the same time, you don't want to overwhelm them with details that only dilute a report's impact. Honing an action-oriented security report is half science, half art. The science is rooted in the tools that measure security events: number of breaches and viruses, what was blocked, what got through, the damage caused, and the staff hours and resources used to support security. This is the raw, empirical data culled from syslogs, management consoles and good old-fashioned observation. The art is the interpretation of ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • SOX section 404: Improving security with executive communications

    by  Edward Hurley

    It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.

  • Best practices for security report writing

    by  Robert Garigue and Marc Stefaniu

    Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close