Security Incident Response CISO dashboard

The Security Incident Response CISO dashboard provides four views into security incident activity, vulnerability trends, security profiles, and business risk profiles.

Access this dashboard under Self-Service > Dashboards. Separate plugins are required to view all the tabs. Point to any of the graphics for detailed information.

Security Operations Center

Requires the Security Incident Analytics plugin.

The Security Operations Center tab is a graphical view of security incident information.
Table 1. Security Operations Center reports
Name Visual Description
Average Time to Identity (Weekly) Trend The 7-day average time it takes to identify a security incident over time.
Average Time to Contain (Weekly) Trend The 7-day average time it takes to contain a security incident over time.
Average Time to Eradicate (Weekly) Trend The 7-day average time it takes to eradicate a security incident over time.
New Security Incidents This Week Single Score and time line The number of new security incidents received in the current week.
Security Incidents Closed This Week Single score and time line The number of security incidents closed in the current week.
Number of Security Incidents by Priority Single score, trend, and distribution Security incidents listed by the following priorities:
  • 1- Critical
  • 2- High
  • 3- Moderate
  • 4-Low

Trends and distribution are shown for each priority.

New vs. Closed Security Incidents (Weekly) Timeline The 7-day comparison of new and closed security incidents.
Security Incident Map Map Security incident data by geographical location. The world map is highlighted in every area in which an incident occurs. A map allows you to drill down to security incident information by location.
Business Services with Security Incidents - Business Impact Treemap Business services with security incidents with available groupings by business criticality.

Vulnerability Profile

Requires the Security Incident Analytics, and Vulnerability Analytics plugins.

The Vulnerability Profile tab is a graphical view of Vulnerability trends, models, and items.
Table 2. Vulnerability Profile reports
Name Visual Description
Displays models with the most vulnerable items. Displays models with the most vulnerable items. Displays models with the most vulnerable items.
Vulnerability Map Map Vulnerable item data by geographical location. The world map is highlighted in every area in which a vulnerability occurs. A map allows you to drill down to vulnerable item information by location.
Most Vulnerable CIs by Class Donut Displays CIs with the most vulnerable items, categorized by class.
Services with Critically Significant Vulnerabilities Treemap Services with significant vulnerabilities grouped by business criticality.

Security Controls Profile

Requires the Security Incident Analytics andPolicy and Compliance Management plugins.

The Security Controls Profile tab is a graphical view of security profile information.
Table 3. Security Controls Profile reports
Name Visual Description
Profile Choice menu Choose the company information to display.
Non Compliant Profiles Bar chart List of profiles with non-compliant controls.
Control Compliance Donut Displays the number of company profiles and their compliance status.
  • Green = compliant
  • Red = non-compliant
  • Yellow = empty
  • Gray = not applicable
Control Overview Bar chart Control count by group and stack. Choice menus provide you with filter control. Group by:
  • Document (default)
  • Status
  • Category
  • Type
Stack by:
  • Status
  • Category
  • Type
  • Document
Citations by Authority Document Donut Displays the citations on authority documents for the company.
Policy Exceptions List List of policy exceptions.

Business Risk Profile

Requires the Security Incident Analytics andRisk Management plugins.

The Business Risk Profile tab is a graphical view of the business profiles associated with risk.
Table 4. Security Controls Profile reports
Name Visual Description
Risks by Category Donut Displays risks by category.
Profile Choice menu and single scores Choose a company. Displays the moderate, high, and very high risk scores for that company.
Inherent Risk Bubble graph Displays the inherent risk scores as Single Loss Expectancy (SLE) over Annual Rate of Occurrence (ARO) by
Residual Risk Bubble graph Displays the residual risk scores as Single Loss Expectancy (SLE) over Annual Rate of Occurrence (ARO) by
Risk by Profile Bar chart Risk count by group and stack. Group by:
  • Profile (default)
  • Owner
  • Inherent score
  • Residual score
Stack by:
  • Owner
  • Inherent score (default)
  • Residual score
  • Profile