CODY KELLER

It’s the end of Q1. You’ve spent three months firefighting, deploying patches, running tabletop exercises, and managing vendor assessments. You have mountains of data. Dashboards full of charts. Logs that could fill a library.

And now someone says: “Can you put together a one-page summary for the Board?”

One page. Three months of work. One page.

If that request makes your eye twitch, you’re not alone. The Quarterly Business Review is where a lot of security leaders stumble — not because they lack the data, but because they haven’t learned how to translate it. The Board doesn’t speak CVE. They speak revenue, reputation, and risk.

The Vanity Metrics Trap

Let me paint a picture. A security leader walks into a QBR and presents a slide that says: “We blocked 14,322 malicious emails this quarter.”

The Board nods politely. Someone asks a vague follow-up question. The meeting moves on. Nothing changes.

That’s a vanity metric. It sounds impressive. It’s technically accurate. And it tells the Board absolutely nothing useful about the organization’s risk posture. How many of those emails were targeted? How many got through? Did any lead to credential compromise? Did the number go up or down from last quarter, and why?

Here are some common vanity metrics that show up in QBRs:

  • “We blocked X threats” — Total volume of blocked threats (firewalls, email gateways, WAF).
  • “We completed Y vulnerability scans” — Tells you the program exists, not how well it works.
  • “Our uptime was 99.9%” — Availability is not the same as resilience or security.
  • “We patched 200 systems” — What if 50 of those 200 are critical and older than 90 days?

These metrics aren’t worthless. They have a place in operational reporting. But they don’t belong on the one page you’re putting in front of executives, because they don’t answer the only question the Board is actually asking: “Are we okay?”

The “So What?” Framework

Every metric you put in front of the Board should survive a simple, ruthless test. After you state the metric, imagine the most blunt executive you know leaning forward and saying: “So what?”

If you can’t immediately connect that data point to a business outcome — revenue impact, regulatory exposure, customer trust, operational disruption — it doesn’t make the cut.

Here’s how the “So What?” framework transforms a typical QBR metric:

  • Raw Metric: We blocked 14,322 malicious emails this quarter.
  • So What: Of those, 47 were targeted spear-phishing attempts against finance and executive staff. Three bypassed our gateway. All three were caught by user reporting within 15 minutes, resulting in zero compromise.
  • Business Translation: Our targeted phishing exposure decreased 30% from Q4, driven by our updated email authentication policies and the phishing simulation program we launched in January. User reporting rates are up 22%.

See the difference? The raw metric is noise. The translated version tells a story about risk reduction, program effectiveness, and employee behavior change. That’s what gets budget approved. That’s what earns trust.

Building Your One-Page Executive Summary

One page forces discipline. It requires you to prioritize. Here’s a structure that works well across industries and board compositions:

1. Risk Posture Summary (2–3 sentences)

Open with the headline. Is the organization’s risk posture improving, stable, or degrading compared to last quarter? State it clearly and back it with one or two data points. No jargon. Example: “Our overall risk posture improved in Q1, driven by a 40% reduction in critical vulnerability exposure time and zero security incidents with material business impact.”

2. Key Metrics That Survived the “So What?” Test (3–4 metrics)

Pick only metrics that tie directly to business outcomes. Strong candidates include:

  • Mean Time to Remediate (MTTR) for Critical Vulnerabilities — How long critical vulnerabilities remain open after discovery.
  • Security Incidents with Business Impact — Number of events that caused actual or potential business disruption, not total alert volume.
  • Compliance Posture — Percentage of systems, applications, or vendors assessed against required frameworks, with open findings.
  • Top 3 Risks by Business Impact — Where the program is exposed to cost, disruption, or regulatory action.

3. What We Did About It (Key Accomplishments)

This is where you connect investment to outcome. Don’t list activities. List results. Not “we deployed MFA,” but “MFA deployment reduced account takeover incidents by 85% and eliminated our #2 audit finding from last year.”

4. What Keeps Me Up at Night (Emerging Risks / Asks)

End with forward-looking risk. This is your chance to plant seeds for budget requests, staffing needs, or strategic shifts. Frame it as business risk, not technical anxiety. “The rise of AI-enabled phishing is increasing the sophistication of social engineering attacks targeting our finance team. I’m recommending we invest in real-time voice authentication for wire transfer approvals in Q2.”

Speaking Their Language

The hardest part of the QBR isn’t the data. It’s the translation. Technical people are trained to be precise and comprehensive. Board members are trained to make decisions quickly with incomplete information. Your job in the QBR isn’t to demonstrate how much you know. It’s to give the Board confidence that you know what matters.

That means shorter sentences. Fewer acronyms. Business language. And the discipline to leave 90% of your data on the cutting room floor.

The best QBR I ever sat through lasted twelve minutes. One page. Three questions from the Board. All three were forward-looking, strategic questions — not confused requests for clarification. That’s the goal.

Make them curious, not confused.

Discussion Questions

1. Look at your last QBR deck. How many of your metrics would survive the “So What?” test if your most skeptical Board member challenged them?

2. What’s the single most valuable metric you’ve found for communicating security posture to non-technical executives?

3. How do you currently handle the “What Keeps Me Up at Night” section — do you use it strategically to shape future budget conversations?

Further Reading

  • NACD – Cyber-Risk Oversight for Corporate Boards: https://www.nacdonline.org/all-governance/governance-resources/
  • Gartner – How to Present Cybersecurity to the Board: https://www.gartner.com/en/cybersecurity
  • NIST Cybersecurity Framework 2.0 – Govern Function: https://www.nist.gov/cyberframework

Tags

QBR, Executive Reporting, Board Communication, Vanity Metrics, So What Framework, Risk Posture, GRC, Security Metrics, CISO Leadership, Cybersecurity Strategy


Leave a Reply

Your email address will not be published. Required fields are marked *