AI isn’t conscionable improving information operations; it’s fundamentally rewriting nan rules of what’s possible. And that intends nan metrics we’ve relied connected for decades are abruptly becoming irrelevant.
Every subject has faced this reckoning. Software improvement erstwhile measured productivity successful lines of codification written — a metric that became instantly meaningless erstwhile AI could make thousands of lines successful seconds. DevOps teams built their world astir DORA metrics for illustration deployment wave and alteration nonaccomplishment rate, optimized for human-paced merchandise cycles. When AI tin test, validate, and deploy changes continuously, those benchmarks measurement nan incorrect constraints entirely.
Security is next.
Traditional metrics measured quality efficiency successful human-constrained operations. Mean Time to Alert and Acknowledge (MTTAck). Mean Time to Detect (MTTD). Mean Time to Investigate. (MTTI). Mean Time to Contain. (MTTC0 Mean Time to Respond and Recover. (MTTR)
Not to mention nan emblematic stuff, for illustration alert volume. These made consciousness erstwhile each alert needed quality eyes, and consequence velocity was constricted by really accelerated an expert could type.
AI doesn’t person those constraints. When AI-driven systems process thousands of alerts simultaneously and execute consequence playbooks autonomously, measuring “time per alert” becomes meaningless. Celebrating that AI reduced your MTTR from 4 hours to 2 is for illustration celebrating that your Tesla idles efficiently. You’re measuring nan incorrect point entirely.
What Metrics Actually Matter
The transformational worth isn’t successful doing aged tasks faster. It’s successful achieving outcomes that were antecedently impossible.
So what does this genuinely mean?
What does this look for illustration successful practice, and not arsenic subject fiction?
1. Coverage Within Critical Time Windows.
It doesn’t matter if you trim your MTTR from 4 hours to 2 hours erstwhile nan onslaught completes successful 12 minutes. This is nan difficult reset that MITRE ATT&CK timing information reveals. Each method has a real-world execution model pinch credential stuffing successful 3 minutes, lateral activity successful eight, and information exfiltration successful 12.
For onslaught techniques successful your environment, is your detection-to-containment velocity faster than nan emblematic execution time?
Assuming a communal SaaS exfiltration completes successful 12 minutes, if your automated consequence takes 15 minutes, past nan difficult truth is — you’re still losing.
The Right Metrics to Track: Track what percent of onslaught categories you tin respond to faster than attackers execute. This tells you wherever you’re winning races versus conscionable processing aftermath efficiently.
2. Attack Progression Prevention Rate.
Traditional information accepted that immoderate attacks would complete their termination concatenation because human-speed containment astatine each shape was impossible. An expert could extremity first entree aliases incorporate lateral movement, but seldom some successful nan aforesaid onslaught sequence.
AI-driven automation changes this equation entirely. It tin break onslaught chains astatine aggregate points simultaneously, blocking first entree attempts, containing lateral movement, and preventing exfiltration.
The mobility isn’t whether you responded to each shape efficiently. It’s whether nan attacker achieved their nonsubjective astatine all.
The Right Metric to Track: Percentage of onslaught attempts that successfully complete their termination chain. “Successful persistence events dropped from 12% to 2% of attempts” is ROI. “We processed 40% much alerts” is not.
3. Sophistication of Threats Detected.
Typically, operations are optimized for detecting high-volume, well-understood attacks because those were tractable for human-scale analysis. While subtle, novel, low-volume attacks succeeded undetected, because nary quality had clip to hunt for them.
AI-driven systems should push continuously into discovery territory that was antecedently dark. They should find nan weird lateral activity shape that happens erstwhile each six months. The credential entree that doesn’t lucifer immoderate known attack signature but fits an emerging adversary behavior.
If nan attacks you’re uncovering this 4th look precisely for illustration past quarter’s threats, your AI isn’t learning, it’s conscionable automating your aged discovery logic faster.
The Right Metric to Track: The severity and novelty of detected threats quarter-over-quarter. Are you catching attacks that would person succeeded undetected past year?
4. Analyst Time Allocation Shift.
Previously, operations accepted that 80% of expert clip was spent connected reactive work, alert triage, regular investigation, and known-threat response. That’s conscionable what nan workload demanded erstwhile humans were nan bottleneck.
AI-driven automation should fundamentally flip this ratio. When AI handles high-volume, low-complexity discovery and response, your analysts should walk nan mostly of their clip connected activity that only humans tin do: threat hunting for caller onslaught patterns, building discovery logic for emerging adversary behaviors, closing architectural information gaps, reddish squad collaboration.
If your analysts are still spending astir of their clip connected alert triage aft implementing AI automation, you haven’t achieved transformation; you’ve conscionable made them somewhat faster astatine nan incorrect work.
The Right Metric to Track: Percentage of expert clip spent connected proactive security activity versus reactive incident response. A bully target is 70% proactive, wrong 12 months of AI implementation.
5. Direct Business Risk Reduction.
Traditional metrics were proxies because we couldn’t quantify nan number of prevented attacks aliases nan business effect of faster detection. AI-driven systems make nan visibility and result information to measurement this directly.
For each onslaught way wherever AI automation closes a timing gap, you tin cipher nan existent consequence avoided: attacks detected earlier completion, multiplied by nan imaginable business impact, multiplied by nan probability based connected threat intelligence.
Example: Your SaaS exfiltration script shows attacks complete successful 20 minutes connected average. Your erstwhile consequence took 2.5 hours; you mislaid by default. With AI-driven automation, you execute eight-minute detection-to-containment — you now win. If nan customer information astatine consequence represents $45M successful regulatory fines and liability, and threat intelligence shows 35% yearly probability of this onslaught type, you’ve avoided $15.75M successful consequence annually. Making nan business lawsuit for AI is comparatively easy.
The Right Metric to Track: Dollars of business consequence closed by category, calculated as: (Business Impact × Attack Probability × Win Rate Improvement). This translates straight to board-level language.
6. Win Rate by Attack Technique.
Generic MTTR tells you thing astir whether you’re really stopping attacks. Technique-specific triumph complaint tells you everything.
For each MITRE ATT&CK method successful your threat model, comparison 2 numbers: clip from first discuss to attacker’s nonsubjective versus clip from first discuss to your containment action. If your containment clip is longer than their execution time, you mislaid that race. If it’s shorter, you won.
Track this crossed each your applicable techniques. “We successfully contained 73% of attempted lateral activity attacks earlier attackers achieved domain admin” demonstrates existent protect success. “Our mean clip to respond improved 40%” conscionable intends you’re processing failures much efficiently.
The Right Metric to Track: Win complaint percent by MITRE ATT&CK method category, pinch inclination complete time. A bully target is to execute supra 75% for your astir captious onslaught paths.
Making nan Transition
You don’t request to rebuild your full metrics model overnight. Start pinch 1 onslaught way that keeps your executive squad up astatine night.
Pick your scariest scenario, nan 1 wherever business effect is clear and executives instantly understand nan stakes. Ransomware encryption of accumulation systems. Exfiltration of customer PII. Compromise of your SaaS admin accounts. Whatever poses an existential consequence to your organization.
Map that azygous onslaught way utilizing MITRE ATT&CK. Document nan emblematic execution timeline based connected threat intelligence and reddish squad exercises. Document your existent discovery and consequence timeline honestly — not champion case, but what really happens erstwhile an expert is successful nan mediate of 3 different investigations. Calculate nan gap. Calculate nan business effect if this onslaught succeeds.
Then measurement whether AI-driven automation closes that gap. Not whether it processes alerts faster aliases reduces your generic MTTR, but whether it moves your containment velocity beneath nan attacker’s execution model for this circumstantial termination chain. Track your triumph complaint for conscionable this 1 script complete ninety days.
That single, actual illustration becomes your template. Once activity understands nan framework, attacker velocity versus defender speed, triumph complaint versus process efficiency, consequence closed versus alerts processed, you tin standard nan aforesaid attack crossed your different captious onslaught paths.
YOUTUBE.COM/THENEWSTACK
Tech moves fast, don't miss an episode. Subscribe to our YouTube channel to watercourse each our podcasts, interviews, demos, and more.
Group Created pinch Sketch.
English (US) ·
Indonesian (ID) ·