Mitigation Dashboard
Discover how to effectively track and minimize risks through a comprehensive Mitigation Dashboard.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
The Mitigation Dashboard provides an overview of active and completed mitigation efforts across categories like Data Sensitivity, Vulnerability, and Secure Baseline. This guide outlines each section of the dashboard and the insights it provides.

Mitigation Plans Overview
This section presents a summary of all mitigation plans:
- Total: Total number of mitigation plans across all categories.
- Completed: Number of plans successfully closed.
- On Schedule: Plans currently progressing within their scheduled timeframe.
- Behind: Plans that are delayed but not yet overdue.
- Past Due: Plans that have exceeded their scheduled completion date.
This overview helps quickly gauge the status and timeliness of mitigation efforts.
All Plans - Open vs Closed
This pie chart visualizes the proportion of open (active) versus closed (completed) mitigation plans. It provides a quick snapshot of the overall completion rate, showing how many plans remain in progress compared to those that have been resolved.
Distribution of Plans
This chart breaks down all mitigation plans by category, illustrating the proportion dedicated to:
- Data Sensitivity
- Vulnerability
- Secure Baseline
This distribution view helps prioritize resource allocation based on the volume of plans in each area.
Open Plans vs Overdue
This chart highlights the distribution of open plans that are overdue versus those that are still within their expected schedule. It provides an at-a-glance view of overdue mitigation tasks, helping users identify areas that need immediate attention to maintain security posture.

Mitigation Key Performance Indicators (KPIs)
The KPIs provide insights into the effectiveness and timeliness of mitigation efforts. They cover:
- Current Exposure: Shows whether mitigation plans are staying on schedule, falling behind, or moving ahead.
- Past Performance: Reflects the percentage of plans that were completed within their original schedule, offering insights into historical adherence to timelines.
Each KPI is broken down by category (Data Sensitivity, Vulnerability, Secure Baseline), offering a detailed look at each area's exposure and past performance.

Top 5 Targets with the Most Active Mitigation Plans
This section lists the top five targets with the highest number of active mitigation plans for each category:
- Data Sensitivity: Targets with the most data sensitivity-related mitigation actions.
- Vulnerability: Targets with the most vulnerability mitigation plans in progress.
- Secure Baseline: Targets actively working on secure baseline-related mitigation actions.
This breakdown identifies the most critical targets and helps prioritize efforts for high-risk areas.
Mitigation by Type
This section categorizes mitigation efforts by type, showing:
- Completed Plans: Number of mitigation plans that have been closed.
- Active Plans: Number of mitigation plans currently in progress.
- % Completion: A visual bar showing the completion rate for each mitigation type.
This detailed view helps assess the workload and progress for each type of mitigation, enabling better management of ongoing efforts.
By reviewing the Mitigation Dashboard, users can understand the current state of their mitigation activities, identify high-priority areas, and track performance across different security areas. This information supports more informed decision-making and enables proactive risk management.