<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Thinking Strategically about Information Security Metrics</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=99" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=99</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=99&#038;cpage=1#comment-86</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 09 Jun 2009 23:39:04 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=99#comment-86</guid>
		<description><![CDATA[@Brad -

Incidents by definition or successful attacks and are within our control to the extent that our control infrastructure works to minimize them. If they are entirely out of our control, we wouldn&#039;t have a profession (or a job).

It is okay to be skeptical, but I recommend not giving up without looking a bit more closely, and with fewer analogies.

Thanks for the comment,

Pete
]]></description>
		<content:encoded><![CDATA[<p>@Brad -</p>
<p>Incidents by definition or successful attacks and are within our control to the extent that our control infrastructure works to minimize them. If they are entirely out of our control, we wouldn&#8217;t have a profession (or a job).</p>
<p>It is okay to be skeptical, but I recommend not giving up without looking a bit more closely, and with fewer analogies.</p>
<p>Thanks for the comment,</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Brad Andrews</title>
		<link>http://spiresecurity.com/?p=99&#038;cpage=1#comment-85</link>
		<dc:creator>Brad Andrews</dc:creator>
		<pubDate>Tue, 09 Jun 2009 22:05:28 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=99#comment-85</guid>
		<description><![CDATA[I am not sure metrics are this simple.  Incidents are totally outside your control, unless you limit those to &quot;successful incidents.&quot;  While you can do some things to secure your border, for example, you cannot control when a new Worm is released or when someone decides to DoS your servers.

Applying these to other areas, like manufacturing or software development, has a lot more of the metrics under the control of the individual.  Many areas even know the industry values for many things.  Auto mechanics have a book that tells how long a given repair should take.

I don&#039;t see how we are ever going to get to that state since we don&#039;t have a repeatability to many things here, especially the incidents as I discussed above.

That makes me wonder if the whole focus on metrics is ultimately a waste of time....

Brad
]]></description>
		<content:encoded><![CDATA[<p>I am not sure metrics are this simple.  Incidents are totally outside your control, unless you limit those to &#8220;successful incidents.&#8221;  While you can do some things to secure your border, for example, you cannot control when a new Worm is released or when someone decides to DoS your servers.</p>
<p>Applying these to other areas, like manufacturing or software development, has a lot more of the metrics under the control of the individual.  Many areas even know the industry values for many things.  Auto mechanics have a book that tells how long a given repair should take.</p>
<p>I don&#8217;t see how we are ever going to get to that state since we don&#8217;t have a repeatability to many things here, especially the incidents as I discussed above.</p>
<p>That makes me wonder if the whole focus on metrics is ultimately a waste of time&#8230;.</p>
<p>Brad</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: PhilA</title>
		<link>http://spiresecurity.com/?p=99&#038;cpage=1#comment-84</link>
		<dc:creator>PhilA</dc:creator>
		<pubDate>Sun, 05 Apr 2009 07:19:49 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=99#comment-84</guid>
		<description><![CDATA[Pete,

As always, a good post.  Can you bring this to more practical terms?

What would your Infosec approach for metrics be at a technology manufacturing company or an Online business?

Thanks,
PhilA
]]></description>
		<content:encoded><![CDATA[<p>Pete,</p>
<p>As always, a good post.  Can you bring this to more practical terms?</p>
<p>What would your Infosec approach for metrics be at a technology manufacturing company or an Online business?</p>
<p>Thanks,<br />
PhilA</p>
]]></content:encoded>
	</item>
</channel>
</rss>
