Power BI Dashboard: Cybersecurity Operations Monitoring

Project Overview

A comprehensive 3-page Power BI dashboard providing real-time visibility into cybersecurity operations, vulnerability management, and compliance tracking across 500+ enterprise systems.

Built for: Executive decision-making and security operations prioritization
Timeline: October – November 2025
Tools: Power BI Pro, DAX, Power Query, SQL

๐Ÿ”— Explore Interactive Dashboard

๐Ÿ’ป View Code on GitHub

The Challenge

Security teams at enterprise organizations struggle with:

โŒ Visibility gaps – 500+ vulnerabilities scattered across multiple systems
โŒ Priority confusion – Which issues need immediate attention?
โŒ Compliance complexity – Tracking SOC 2, ISO 27001, NIST requirements
โŒ Manual reporting – Hours spent preparing status updates for executives

The question leadership asks: “What’s critical RIGHT NOW?”

Most teams can’t answer quickly.

My Approach

I designed a 3-page dashboard that tells a complete operational story:

  1. Executive Summary – 30-second status scan for C-suite
  2. Vulnerability Management – Detailed analysis for security teams
  3. Compliance Tracking – Framework monitoring for audit preparation

Each page serves a specific audience with the exact insights they need.

Page 1: Executive Summary

Purpose: High-level operational status for C-suite and security leadership

Key Metrics Tracked:

๐Ÿ“Š Current Status

  • 90 Open vulnerabilities
  • 85 In-Progress
  • 325 Closed (78% closure rate – exceeds industry average of 65%)

โฑ๏ธ Performance

  • 20-day average time to remediate (meets SLA target of <25 days)
  • 31 Critical vulnerabilities requiring immediate attention

๐ŸŽฏ Risk Profile

  • Severity distribution: 40% Medium, 30% High, 15% Critical, 15% Low
  • Applications have highest count: 194 total (26 Critical)

Key Insight:

The stacked bar chart reveals Applications have 26 Critical vulnerabilities – immediately directing security teams to prioritize application patching over other system types.

Interactive features: Filter by Location and Remediation Owner for drill-down analysis.

Page 2: Vulnerability Management

Purpose: Operational intelligence for security teams to identify trends, aging vulnerabilities, and prioritize remediation work

What This Page Reveals:

๐Ÿ“ˆ Trend Analysis

  • Q1 2024: 195 vulnerabilities discovered (annual audit spike)
  • Q3 2025: Discovery and closure rates converging (improvement)
  • Clear quarterly patterns guide resource planning

โฐ Aging Analysis

  • 225 vulnerabilities aged 90+ days (backlog requiring escalation)
  • Stacked by severity: Most are Medium priority, but Critical items exist
  • Visual immediately shows if urgent issues are aging too long

๐ŸŽฏ At-Risk Systems

SystemCriticalHighAvg Days Open
CRM57415
Patch Management57348
Payment Gateway510303

Key Insight:

CRM system has 5 Critical vulnerabilities with 415-day average age – the conditional formatting (dark blue highlighting) draws immediate attention to this urgent remediation priority.

Technical note: The aging chart uses a stacked column design to show severity composition within each time bucket – revealing that not all aged vulnerabilities are equal priority.

Page 3: Compliance Tracking

Purpose: Framework compliance monitoring for audit committees and risk management

Compliance Status:

๐Ÿ“Š Overall Score: 78%

  • Target: 80% (currently 2.34% below)
  • Q3 2025 peak: 95%
  • Q4 2025 decline: 78%

๐Ÿ“‰ What Happened in Q4?

The trend line tells the story: Compliance peaked at 95% in Q3, then dropped to 78% in Q4. This reflects a comprehensive year-end audit that identified previously undetected gaps.

Framework Breakdown:

SOC 2 Type II: 77 findings (highest count)

  • 6 Critical
  • 14 High
  • 38 Medium
  • 19 Low

ISO 27001: 74 findings
NIST SP 800-53: 24 findings
PCI DSS: 7 findings

Business Unit Performance:

  • Operations: 79% (lowest – needs focused support)
  • HR: 81%
  • IT: 83%
  • Finance: 86%
  • Security: 89%
  • Other: 100%

Key Insight:

The matrix visual groups findings by framework and severity, revealing that SOC 2 Type II compliance requires immediate attention with 77 total findings concentrated in monitoring and malicious software controls.

Technical Highlights

Data Architecture

Data Model: Star schema design

  • Fact Table: Vulnerabilities (500 rows)
  • Dimension Tables: Systems (30 rows), Compliance (200 rows)
  • Date Table: Custom DAX-generated calendar (2024-2025)

Relationships: One-to-many from Systems โ†’ Vulnerabilities

Advanced Power BI Features

โœ… Custom DAX Measures

MTTR = 
CALCULATE(
    AVERAGE(Vulnerabilities[Days_To_Remediate]),
    Vulnerabilities[Status] = "Closed"
)

Critical Count = 
CALCULATE(
    COUNTROWS(Vulnerabilities),
    Vulnerabilities[Severity] = "Critical"
)

โœ… Conditional Formatting
Gradient scales automatically highlight high-priority items using color intensity

โœ… Cross-Page Filtering
Slicers enable multi-dimensional analysis across all visualizations

โœ… Matrix Visuals
Hierarchical grouping by framework reveals compliance patterns

โœ… Time Intelligence
Trend analysis with quarter-over-quarter comparisons

Design Principles Applied

Color Strategy:

  • Blue gradient palette for professional, corporate appearance
  • Darker shades indicate higher priority/urgency
  • Minimal accent colors (orange for targets only)
  • Consistent across all pages

Information Hierarchy:

  • Page 1: Summary metrics (executive 30-second scan)
  • Page 2: Operational details (daily security team use)
  • Page 3: Compliance monitoring (audit preparation)

Real-World Applications

This dashboard structure is used in:

๐Ÿข Security Operations Centers (SOC)
Real-time monitoring and incident prioritization

๐Ÿ”’ Risk Management
Executive reporting on security posture and compliance status

๐Ÿ“‹ Audit Preparation
Framework compliance tracking for SOC 2, ISO 27001, NIST assessments

๐Ÿ‘” Board Presentations
C-suite visibility into cybersecurity operations

Industries:

Utilities โ€ข Financial Services โ€ข Healthcare โ€ข Government โ€ข Technology

Based On:

This structure mirrors production dashboards I worked with in the Energy sector, where I tracked $50M+ IT operations and cybersecurity compliance for utility infrastructure.

What This Project Demonstrates

Technical Skills

โœ… Power BI Pro (advanced visualizations, DAX, Power Query)
โœ… Data modeling (star schema, relationships, calculated columns)
โœ… Business intelligence (KPIs, trend analysis, conditional formatting)
โœ… SQL (data extraction and transformation)

Business Acumen

โœ… Cybersecurity domain knowledge
โœ… Risk-based prioritization thinking
โœ… Executive communication (distilling technical data for leadership)
โœ… Compliance framework understanding (SOC 2, ISO 27001, NIST)

Soft Skills

โœ… Translating business requirements into technical solutions
โœ… Information design and visual communication
โœ… Stakeholder-focused reporting

Portfolio Quality

This isn’t a tutorial project. It’s production-ready work that could be deployed in enterprise environments today.

Explore the Project

๐Ÿ”— Interactive Dashboard

Launch Dashboard
Try the filters, explore the data, see how interactive visualizations guide decision-making.

๐Ÿ’ป GitHub Repository

View Code & Documentation
Complete technical documentation, DAX measures, data model structure, and design decisions.

๐Ÿ“บ Video Walkthrough

Coming This Week
5-minute guided tour explaining the business problem, technical approach, and key insights.


Let’s Connect

Interested in discussing data analytics, Power BI best practices, or cybersecurity operations?

๐Ÿ“ง Email: hello@ernestogonzales.com
๐Ÿ’ผ LinkedIn: linkedin.com/in/eg-data
๐Ÿ’ป GitHub: github.com/ernestog27
๐ŸŒ More Projects: Browse Portfolio


Ernesto Gonzales, MSDA
Data Analyst | San Diego, CA
Master’s Degree in Data Analytics, Western Governors University

Specializing in Power BI, SQL, Python, and transforming complex operations into executive insights.

Comments

Leave a comment