Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Mitigation

Mitigation Dashboard

Discover how to effectively track and minimize risks through a comprehensive Mitigation Dashboard.

Written by Noah Garland

Updated at November 15th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Mitigation Plans Overview All Plans - Open vs Closed Distribution of Plans Open Plans vs Overdue Mitigation Key Performance Indicators (KPIs) Top 5 Targets with the Most Active Mitigation Plans Mitigation by Type

The Mitigation Dashboard provides an overview of active and completed mitigation efforts across categories like Data Sensitivity, Vulnerability, and Secure Baseline. This guide outlines each section of the dashboard and the insights it provides.


 

Mitigation Plans Overview

This section presents a summary of all mitigation plans:

  • Total: Total number of mitigation plans across all categories.
  • Completed: Number of plans successfully closed.
  • On Schedule: Plans currently progressing within their scheduled timeframe.
  • Behind: Plans that are delayed but not yet overdue.
  • Past Due: Plans that have exceeded their scheduled completion date.

This overview helps quickly gauge the status and timeliness of mitigation efforts.


All Plans - Open vs Closed

This pie chart visualizes the proportion of open (active) versus closed (completed) mitigation plans. It provides a quick snapshot of the overall completion rate, showing how many plans remain in progress compared to those that have been resolved.


Distribution of Plans

This chart breaks down all mitigation plans by category, illustrating the proportion dedicated to:

  • Data Sensitivity
  • Vulnerability
  • Secure Baseline

This distribution view helps prioritize resource allocation based on the volume of plans in each area.


Open Plans vs Overdue

This chart highlights the distribution of open plans that are overdue versus those that are still within their expected schedule. It provides an at-a-glance view of overdue mitigation tasks, helping users identify areas that need immediate attention to maintain security posture.


 

Mitigation Key Performance Indicators (KPIs)

The KPIs provide insights into the effectiveness and timeliness of mitigation efforts. They cover:

  • Current Exposure: Shows whether mitigation plans are staying on schedule, falling behind, or moving ahead.
  • Past Performance: Reflects the percentage of plans that were completed within their original schedule, offering insights into historical adherence to timelines.

Each KPI is broken down by category (Data Sensitivity, Vulnerability, Secure Baseline), offering a detailed look at each area's exposure and past performance.


 

Top 5 Targets with the Most Active Mitigation Plans

This section lists the top five targets with the highest number of active mitigation plans for each category:

  1. Data Sensitivity: Targets with the most data sensitivity-related mitigation actions.
  2. Vulnerability: Targets with the most vulnerability mitigation plans in progress.
  3. Secure Baseline: Targets actively working on secure baseline-related mitigation actions.

This breakdown identifies the most critical targets and helps prioritize efforts for high-risk areas.


Mitigation by Type

This section categorizes mitigation efforts by type, showing:

  • Completed Plans: Number of mitigation plans that have been closed.
  • Active Plans: Number of mitigation plans currently in progress.
  • % Completion: A visual bar showing the completion rate for each mitigation type.

This detailed view helps assess the workload and progress for each type of mitigation, enabling better management of ongoing efforts.


By reviewing the Mitigation Dashboard, users can understand the current state of their mitigation activities, identify high-priority areas, and track performance across different security areas. This information supports more informed decision-making and enables proactive risk management.

reduction panel abatement monitor mitigation plan mitigation dashboard

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Create a Compliance GRC Assessment

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand