Target Baseline Value
Name Description Performance Value
Data Security and Protection Scorecard An example of data security strategy with KPIs that helps to quantify risks, track the efforts of the security team and validate achieved results. Read more: https://bscdesigner.com/cybersecurity-strategy.htm 66.3% 66.3
Finance If we achieve excellence in data security, what outcomes will our stakeholders see? 28.66% 28.66
Reduce potential financial damage from data breach 28.66% 28.66
Data breach cost per record 37.14% 2.7
Costs of data breach (direct costs) Forensic analysis, investigation activities, fines, compensations 32.5% 540,000
Cost of customer churn 45% 5,280,000
Lost opportunity cost 0% 48,000
Mitigate data security and data protection risks 66.7% 66.7
General data Link indicators to respective scorecards for real data 0
LTV Customer lifetime value 12,000
Customer churn due to data breach Loss of customers due to data protection/data security breaches 1.1
Number of customers 40,000
Potential customers lost 4
Number of data records 200,000
Customer What are the expectations of our internal and external customers in the context of data and information security? 66.7% 66.7
Mitigate data security and data protection risks 66.7% 66.7
Early detection and fast response to the data risks 71.33% 71.33
Data Protection Readiness 96% 96
Data protection officer nominated 100% 100
Explicit consent tracking 100% 100
Data breach reporting procedure 80% 80
Right of access, rectification, erasure implemented 100% 100
Right to data portability 100% 100
Weighted risk index 66.7% 66.7
Critical risk events 75% 1
Important risk events 50% 5
Medium-level risk events 30% 14
Low-level risk events 70% 12
Internal Business Processes What can we do to achieve excellence in data security and protection? 71.33% 71.33
Early detection and fast response to the data risks 71.33% 71.33
Mean Time to Detect 70% 60
Mean Time to Respond 76.67% 7
Develop risk mitigation plan 92% 92
Regular data security audits 97.87% 97.87
Incident response testing 92% 92
Reduce the complexity of IT and data 96.22% 96.22
Data security complexity index 96.22% 96.22
Number of users with highest access level 100% 6
Time to deactivate login credentials 99.94% 4
% of sensitive data controlled by DLP software 83.06% 94
Data encryption and backup automated 100% 100
% of up-to-date security software 94.12% 98
Automation coverage 97% 97
Learning and Growth What skills and infrastructure do we need to build more secure business systems? 98.51% 98.51
Regular data security audits 97.87% 97.87
Regular risks analysis 66.67% 6
Regularly assess the risk of sensitive data 100% 100
Vulnerability scanning 100% 100
Penetration testing 100% 100
Red team testing 100% 100
The number of returning data breaches 93.6% 2
Train employees on data security 100% 100
Data security training penetration rate 97% 97
Phishing Test Success Rate 100% 1.2