Cyber risk report

The cyber risk report provides a structured view of an organization’s cybersecurity risks, current security posture, and risk mitigation strategies. Use this report to get clarity, transparency, and actionable insights about cybersecurity risks and their potential impact on your business objectives.

This report serves as a strategic communication tool, bridging the gap between technical cybersecurity operations and business decision-making. It enables leadership to make informed, risk-based decisions and aligns cybersecurity initiatives with overall business goals.

Create your analysis dashboard using the customizable reporting features. Adjust visuals and layout, and add narratives for board discussions. You can also share your dashboard with Boards sites, enabling seamless sharing and publishing of reports within the Diligent One Platform.

Accessing reporting templates in Activity Center

Prerequisite

The reporting templates must be deployed and enabled for you in your Activity Center. For assistance, contact your Customer Success Manager.

For information about accessing and using reporting template in Activity Center, see Use Diligent One dashboards as templates.

Connecting dashboards to Boards sites

For information about connecting Activity Center dashboards to Boards sites, see Diligent One: Connecting Activity Center dashboards with Boards sites .

Understanding the dashboard structure

The cyber risk report offers several key features designed to provide comprehensive cyber risk insights and facilitate data-driven decision-making. The dashboard structure consists of six tabs that allows you to craft a narrative and present results to your board. It includes visuals and KPIs indicating the current and emerging cyber threats and vulnerabilities, historical view of your organization's cybersecurity performance and improvements. Select each tab below to learn more.

This tab presents a concise overview of critical cybersecurity insights tailored for board-level discussions. You can see contextual information alongside key metrics selected from other sections of the report, ensuring that the board can make informed decisions based on a clear and focused narrative.

Available visuals

The following visuals are available in this section:

Executive Summary

Use this section to provide strategic context, highlight trends, and detail risk mitigation efforts, facilitating quick executive decision-making.

Threat Landscape

This visual presents insights into the current cybersecurity threat landscape, summarizing relevant threats faced by your organization.

Benchmarking

This section highlights historical cybersecurity risk ratings from platforms like BitSight, allowing comparisons against industry standards.

Key Risks

Get details of the most pressing cybersecurity risks, including their status and any necessary actions for mitigation.

Incidents

This section summarizes the frequency and nature of cybersecurity incidents reported, presenting this information in a comprehensible format.

Initiatives

Get details of the ongoing or proposed cybersecurity initiatives that seek to enhance your organization's security posture.

This tab provides definitions and explanations of all the key terms, KPIs, and technical concepts included in the cyber risk report for quick reference. It enables you to have a common, accessible understanding of the complex or technical language used elsewhere in the report, supporting clear communication and more effective decision-making.

The following terminologies are explained in this section:

  • Vulnerability Management is a proactive process aimed at identifying, assessing, mitigating, and monitoring vulnerabilities in an organization's systems, networks, and software to reduce cybersecurity risks.

  • Scanning Tools are used to identify vulnerabilities and assess security risks within an organization's IT infrastructure. These tools help in the continuous monitoring and analysis of systems to detect security weaknesses that could be exploited by attackers.

  • Penetration Testing identifies vulnerabilities, weaknesses, and security gaps in an organization's IT infrastructure and helps assess security defenses, determine potential attack vectors, and assist organizations in mitigating risks before real attackers can exploit them.

  • Security Incident and Event Management (SIEM) software consolidates an organization's security information and events in real time. It plays a vital role in identifying, managing, and responding to security incidents by providing a comprehensive view of an organization's security posture.

  • Incident Management is a structured process to minimize the impact of security incidents, restore normal operations quickly, and prevent future occurrences.

  • NIST CSF Cyber Security Framework is a framework that provides structured guidelines, best practices, and standards to identify, protect, detect, respond to, and recover from cyber threats.

This tab helps you track the status of audits across products or services, referencing common frameworks such as System and Organization Controls 2 (SOC 2) and Health Insurance Portability and Accountability Act (HIPAA). Get a summary of recent audit results, identify areas of non-compliance, and see which products or domains have passed their check.

Available visuals

The following visuals are available in this section:

Compliance/Audit

Use this section to capture the status of your audit reports per product or service.

Security Training

Use this section to track your security training analytics and prepare your security awareness campaign completion report.

Penetration Testing

Use this section to summarize outstanding identified issues by severity and the mean time to remediate high-risk issues.

This tab demonstrates the robustness of your organization's incident response plan. It is supported by quantitative data and emphasizes the detection, diagnosis, remediation, and prevention of incidents.

Available visuals

The following visuals are available in this section:

Incident Management

Use this section to identify, highlight, and explain periods with significant uncharacteristic increases or decreases in your organization's cybersecurity incidents. You can include commentary and data captured from your organization's incident management system.

Incident Identification

Use this section to prepare a high-level metric of alert generation or the number of incidents logged over a specific time period, such as monthly, quarterly, or semi-annually.

Incident Disclosures

Use this section to report and analyze cybersecurity incidents that are considered material based on quantitative and qualitative factors.

This tab focuses on the proactive process of identifying, assessing, mitigating, and monitoring vulnerabilities within your organization's systems, networks, and software.

Available visuals

The following visuals are available in this section:

Vulnerability Management

Outline the current vulnerabilities within your organization, highlighting high-risk assets and critical vulnerabilities that require immediate attention.

Vulnerability Responsiveness

Evaluate how quickly and effectively your organization responds to identified vulnerabilities.

Remediation SLA

Provide updates on SLAs, which are formalized agreements defining the expected timeframes and responsibilities for addressing and resolving identified vulnerabilities.

Use this section to focus on assessing and managing risks posed by your vendors and third-party information systems. This section evaluates your organization's progress in identifying these risks and the measures taken to manage them.

Available visuals

The following visuals are available in this section:

Third-party and Vendor Classification

Categorize vendors based on the criticality of the services they provide, such as critical, high, medium, or low risk. This classification helps prioritize efforts in managing more risky relationships.

Third-party and Vendor Risk Assessments

Identify risk associated with third-party vendors by including metrics such as the number and percentage of vendors within the risk assessment SLAs.