SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsMetrics play a crucial role in understanding the performance of Security Operations Center (SOC) functions.
Read part 1 of this series here.
Metrics play a crucial role in understanding the performance of Security Operations Center (SOC) functions. They serve as a kind of “score,” highlighting areas for improvement while showcasing existing strengths. But the most effective metrics are not created in isolation; they require input and buy-in from various organizational stakeholders.
In this second installment of my Infinite Quest series on building and leading sustainable security operations, I will share a consensus-driven approach to developing SOC metrics that has proven successful over my two decades of experience leading security teams. This collaborative method ensures the metrics align with broader business objectives while addressing specific security concerns.
The Boss Battle: Slay the Metric Misalignment Monster
Security teams often develop metrics without sufficient input from other departments, resulting in measurements that may be technically sound but fail to resonate with leadership or support business goals—a solo quest that doesn’t advance the main storyline, if you will. Even when security teams engage with leadership, executives may struggle to articulate their security concerns in ways that are specific and measurable.
The key challenge lies in developing security metrics that are:
Instead of asking stakeholders directly about security concerns—something they may not naturally consider part of their role—focus discussions on broader business priorities:
This approach reveals where security intersects with stakeholders' priorities, providing a foundation for developing metrics that matter across the organization.
After gathering feedback, look for patterns and translate them into clear narratives. These narratives bridge the gap between technical security concerns and stakeholder priorities.
For example, senior leadership might not explicitly ask about threat detection, but they may be concerned about how the organization is performing comapred to industry peers. The next step is to translate this general concern into specific measures, which we can do by asking clarifying questions.
This process transforms qualitative concerns into actionable metrics, such as:
Of the five major attacks targeting our industry this quarter, we proactively mitigated three through existing controls and effectively responded to two with minimal impact.
This stakeholder-driven methodology offers several advantages:
Existing libraries and frameworks are great cheat codes for developing new metrics. One of my favorites is the SOC-CMM Metrics Suite, which contains a robust library aligned to the SOC-CMM domains. You can download it for free from the CMM website.
Measuring the effectiveness of your SOC is as much an infinite quest as conducting security operations. Stay aligned to business considerations and keep leveling up by:
By developing metrics through collaborative consensus, security teams can shift from measuring activity to measuring impact—demonstrating how security both enables and protects what matters most to the organization.
Mark Orlando brings extensive cybersecurity leadership experience from the Pentagon, White House, and Fortune 500 sectors. As Bionic Cyber's CEO, he's a respected security operations expert with military and academic credentials.
Read more about Mark Orlando