Page 1113 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1113
Number of compromised accounts
Number of software flaws detected in preproduction scanning
Repeat audit findings
User attempts to visit known malicious sites
Once an organization identifies the key security metrics it wishes to
track, managers may want to develop a dashboard that clearly displays
the values of these metrics over time and display it where both
managers and the security team will regularly see it.

