How CISOs should utilize data security posture management to inform risk