CLUSIR RhA – Intervention on the SSI dashboards
Two weeks ago we spoke at the SSI Club of CLUSIR Rhône-Alpesas part of a session on information security dashboards and log management tools.
Our presentation aimed to provide a brief overview of the topic:
- The dashboard as a support for information systems security governance
- Types and objectives of cybersecurity dashboards
- Methodologies for selecting indicators and developing the dashboard
- Implementation: frequency, presentation, documentation
- Issues and points of attention
- Bibliography
Download the presentation: Information Systems Security Dashboards (also available) here on the CLUSIR website).
Dashboards are frequently misused and therefore of limited use, generally due to a lack of design work. However, a preliminary planning phase can transform them into truly effective and relevant tools, whether for operational controls, compliance, or governance. These are all considerations we regularly share with our clients as part of our security consulting and support services, and which we are currently complementing with the design of a suitable tool. We will explore this topic further in the coming months with a series of blog posts.
The CLUSIR session continued with two complementary presentations. Bernard Foray shared his experience with log correlation tools, as well as some information security indicators and their uses. His presentation is available on the CLUSIR website (here). Vincent Gaillot concluded with a counterpoint summary highlighting the benefits and advantages of SSI dashboards and log collection tools.
