![](/sites/default/files/styles/landscape_lg/public/2018-12/Photo_Resource_LibraryBackground1.jpg?itok=VlPTePE_)
Resource Library
APQC’s Resource Library is your source for timely and topical information to help you meet your most complex business process and knowledge management challenges. Explore our ever-growing collection of more than 5000 research-based best practices, benchmarks and metrics, case studies, and other valuable APQC content.
Looking for something specific?
Ask UsResource Results
-
Measure Spotlights|
Percentage of IT incidents resolved in compliance with SLAs
This measure calculates the percentage of IT incidents resolved in compliance with SLAs (Service Level Agreements). The IT function concerns the development, delivery,…
-
Measure Spotlights|
Average cost of a data breach
This measure calculates the average cost of a data breach in the organization. This Cost Effectiveness measure is intended to help companies understand this cost expenditure…
-
Measure Spotlights|
Percentage of cybersecurity FTEs added/hired in the past 12 months attributed to AI
This measure calculates percentage of cybersecurity full-time equivalent employees (FTEs) added/hired in the past 12 months attributed to AI. Artificial Intelligence (AI) …
-
Measure Spotlights|
Dwell time in calendar days
This measure calculates the dwell time in calendar days. In the context of cybersecurity incidents, the dwell time is the time between a successful incursion/compromise and…
-
Measure Spotlights|
Average time in hours to investigate cybersecurity incidents
This measure calculates the average time in hours to investigate cybersecurity incidents i.e., starting from the time a security alert is escalated for investigation until…
-
Measure Spotlights|
Percentage of cybersecurity FTEs having had skill requirement changes in the past 12 months
This measure calculates percentage of cybersecurity full-time equivalent employees (FTEs) today that had skill requirement changes in the past 12 months. Cybersecurity is…
-
Measure Spotlights|
Percentage change in cybersecurity FTEs over the past 12 months
This measure calculates percentage change (added/hired or eliminated/redeployed) of cybersecurity full-time equivalent employees (FTEs) (including contractors and outsourced…
-
Measure Spotlights|
Average time in calendar days to detect cybersecurity incidents
This measure calculates average time in calendar days to detect cybersecurity incidents. Cybersecurity is defined as the ability to protect or defend the use of cyberspace…
-
Measure Spotlights|
Average number of learning days per cybersecurity employee
This measure calculates the average number of days per cybersecurity employee that are dedicated to learning. Learning days are simply the average number of days in a year…
-
Measure Spotlights|
Percentage of cybersecurity FTEs eliminated/redeployed in the past 12 months attributed to AI
This measure calculates percentage of cybersecurity full-time equivalent employees (FTEs) eliminated/redeployed in the past 12 months attributed to AI. Cybersecurity is…
-
Measure Spotlights|
Return on cybersecurity investment (ROSI)
This measure calculates an estimated return on cybersecurity investment. Cybersecurity is defined as the ability to protect or defend the use of cyberspace from cyber…
-
Measure Spotlights|
Average time in calendar days to respond to and recover from cybersecurity incidents
This measure calculates average time in calendar days to respond to and recover from cybersecurity incidents. This begins when an incident has been detected and its scope has…
-
Measure Spotlights|
Learning budget per cybersecurity employee
This measure calculates learning budget per cybersecurity employee. Cybersecurity is defined as the ability to protect or defend the use of cyberspace from cyber-attacks. It…
-
Measure Spotlights|
Percentage of endpoints governed by automated identity management and governance processes
This measure calculates the percentage of endpoints that are governed by automated identity management and governance processes Endpoints or endpoint devices are physical…
-
Measure Spotlights|
Percentage of endpoint devices monitored for suspicious activity, vulnerabilities, and policy violations
This measure calculates the percentage of endpoint devices that are monitored for suspicious activity, vulnerabilities, and policy violations, today. Endpoints or endpoint…