By Steve Riley
As I established in the first part of this article series, cybersecurity programs are typically evaluated on the basis of three components—people, processes and technologies. Previously, I talked about measuring process effectiveness. Now I’ll get into measuring the impact of your technologies. Then I’ll touch on how improvements in both of these




