Security metrics reboot: Less input, better output, real outcomes
Unfortunately, most security awareness professionals don’t really understand the difference between:
✅ Inputs
✅ Outputs
✅ Outcomes
But they don’t want to admit it.
However, if this is you there is no shame in it. It’s not your fault. Maybe it’s never been explained to you. Importantly, it's super easy to fix.
Explaining the difference between inputs, outputs and outcomes.
The quick and simple way to explain it:
Inputs = What you do (e.g., send security training, send a behavior nudge, run phishing simulations).
Outputs = What happens immediately (e.g., % of employees who complete training, # of employees who open the notification, % who click a phishing email).
Outcomes = What actually changes (e.g., fewer employees fall for phishing, XYZ specific behaviour changes by 123%, reduced security incidents).
Think of it like fitness:
🏋️ Input: You go to the gym.
📊 Output: You track how many workouts you did.
💪 Outcome: You get stronger and healthier.
In cybersecurity, we need to measure outcomes - not just how busy we are, but what actually reduces risk, increases efficiency, and improves security culture.
What HRM outcomes should you measure?
Every org is different. No one can be prescriptive here. But if you’re not sure where to start, consider these:
1. Fewer security incidents caused by human error
What it means: A drop in security incidents where human mistakes might be the root cause.
How might you measure it:
- Track successful phishing attacks over time - fewer employees falling for scams = progress.
- Compare account takeovers before and after MFA enforcement - a reduction shows improved security habits.
- Log data handling incidents - fewer misdirected emails or exposed data = better risk awareness.
🔹 Example: If your company had 20 successful phishing attacks last year but only 5 this year, that’s a tangible risk reduction.