This project was a collaboration between Kopenhagen Konsulting and S-cubed. KK Management Konsulting lead the project and report/metric definitions. S-cubed developed and implemented the technical solution. They wanted to automate the process of pulling data reports from multiple systems, calculate various metrics, and create automated visualizations of the figures on a monthly basis.
Qlik Sense & nPrinting
An organizations overall cybersecurity state and readiness is commonly referred to as its Cyber Security Posture. This terminology encompasses several points of information, everything from vulnerability management and security controls to incidence response evaluation, recovery, and compliance. Included is also reporting, which needs to compile data from a multitude of different sources. For this customer, that data, required for reporting, was distributed across many different platforms and systems.
By creating a solid foundation using the Global Information Security units own Qlik platform we were able to ensure a streamlined, flexible, and operational Qlik Sense framework.
Several requirements were taken into consideration. There was a business need for a formal reporting format to be used by and for executive and upper-level management. In addition, automation needed to integrate with several technologies like security tools (e.g. SIEM), capabilities outside the security domain such as IT service management, as well as case and service management systems.
The final project outcome was a strategic reporting format for use in both the IT organization, line of business and the executive office. The Qlik metric dashboard became accessible for all stakeholders via the central, cloud-based platform that contains the real-time metrics. The report also currently serves as a discussion starter with several stakeholders.
Even on the first dashboard and report presentation, several protective measures were initiated. The metric dashboard and report highlighted a systematic issue that affected the overall security posture and based on this, the Chief Information Security Officer proposed a course of action to upper-level management. The report furthermore enabled the ability to assess historic trends and current progress, both in terms of the overall security and regarding specific actions initiated by management.
Selected Case Studies
How do you create a Central Clinical Monitoring Plan that meets the needs of all stakeholders?
Many trials tend to not make it to the planned Last Patient First Treatment date set by Trial Managers…
Our solution enabled the client to fully automate their data extraction from source systems and reduce the manual interactions required.