Data Driven Decision Process
Picture by Shubham Dhage https://unsplash.com/@theshubhamdhage

Data Driven Decision Process

The Tactical Security should be using a Data Driven Decision Process, where measurable data can be analyzed and be a base for the decisions.

Data-driven decision-making (DDDM) is defined as making decisions based on hard data as opposed to intuition, observation, or guesswork. The value of data-driven decisions is dependent on the quality of the data and its analysis and interpretation.

Data-driven decision-making (DDDM) is defined as using facts, metrics, and data to guide strategic business decisions that align with your goals, objectives, and initiatives.

Once you begin collecting and analyzing data, you’re likely to find that it’s easier to reach a confident decision about virtually any challenge

 When you first implement a data-driven decision-making process, it’s likely to be reactionary in nature. The data tells a story, which you and your organization must then react to.

 Data analysis is, at its heart, an attempt to find a pattern within, or correlation between, different data points. It’s from these patterns and correlations that insights and conclusions can be drawn.

 Identify what data you have available that can be used to inform your decision. If no data exists, consider ways in which you could collect it on your own. Once you have the data, analyze it, and use any insights to help you make your decision. 

 A simple way of accomplishing this is to use Balanced scorecard. I am sharing one example on an evaluation Scorecard ( in this case it is to evaluate Suppliers, but the idea is the same with every type of evaluation)

I9-Sample-Evaluation-Scorecard.xls (live.com)

 In the case of tactical security, you would need to quantify your priorities and set it in to context of your perspectives

 Data-Driven Decision Making: A Primer for Beginners (northeastern.edu)

 Based on the tools that are available within IT security, the issue is not a lack of data, but a lack of analysis of the data.

No alt text provided for this image


Backlink

Forwardlink

#Tacticalsecurity

To view or add a comment, sign in

More articles by Niklas Fredengren

  • Multinomial decisions

    As part of the research for this article series, I read a research paper on tactical behaviour of bicyclists. One thing…

  • Investment

    The reason for that is that security is not usually an investment that provides profit but loss prevention. So what is…

  • Budget

    With evolving and emerging cyber threats, setting aside enough budget for cyber security initiatives is increasingly…

  • Value

    Measuring cybersecurity value But how can a company effectively measure its cybersecurity program and whether the…

  • Cost

    We all know that Cybersecurity has a cost. I define it as Cost of Doing something and Cost of Inaction.

  • Proposed solution

    Solutions for handling Cyber security issues, can be divided in to three major solutions: Avoid. If the risk outweighs…

    2 Comments
  • Tactical Output

    The Tactical output is the outcome after all perspectives are taken in to account. This will be the a definition on…

  • Priorities

    In One of the biggest challenge in Cybersecurity is the usage of resources. This leads to a need of choosing between…

    1 Comment
  • Weight

    To be able to prioritize what should be worked on, there is a need to describe what importance each threat has. One…

  • Tactical Input

    Today, security operations do not suffer from a "Big Data" problem but rather a "Big Data Analysis" problem. Let's face…

Others also viewed

Explore content categories