Cyber strategy essentials: Starting a threat landscape review and identifying your crown jewels

Master your cybersecurity strategy with our threat landscape review guides

Part of the Cyber Strategy Management series.

The next two pieces in our Cyber Strategy Management series explore an indispensable aspect of cybersecurity: threat landscape assessment. This process lays the groundwork for a robust cybersecurity strategy that is tailored to your organization’s specific threats and threat events.

Our first article, 1D. Review threat landscape (1/5), explores the most popular risk management frameworks employed in cybersecurity assessments. It explains the adjustments required to adopt these frameworks to organizational threat landscape review. This part also guides you through the necessary preparation activities and includes a wealth of resources that can help you conduct the threat landscape review.

Part 1 highlights:

  • Most popular risk management frameworks
  • Adaptations required for a threat landscape review
  • Required preparation activities
  • Resource recommendations for understanding threat sources and events

In 1D. Review threat landscape (2/5), we illuminate the process of identifying your organization’s crown jewels. These are the mission-critical assets whose compromise could significantly impact your business operations and reputation. The article provides a step-by-step process of creating a simple asset inventory, assessing business value and potential impacts on selected assets, and determining your crown jewels.

Part 2 covers:

  • The concept and identification process of crown jewels
  • The process for assessing business value and impact
  • Selection of assets classified as crown jewels

These articles provide insights into initiating your threat landscape review and identifying your crown jewels, a cornerstone for developing a resilient cyber strategy.

I would like to extend our gratitude to Steve Dobson, Paul Holland and Ivo Gonçalves from the Information Security Forum (ISF) – their support and ISF research were invaluable in crafting a series of these articles on threat landscape review.

Get started on this exploration of threat landscape review, as we arm you with knowledge to fortify your most critical assets against looming threats.

Total
0
Shares
Prev
Leveraging stakeholder insights: Refining your cybersecurity context review

Leveraging stakeholder insights: Refining your cybersecurity context review

Stakeholder insights: Your key to a robust cybersecurity strategy

Next
Unraveling the layers of threat source assessment

Unraveling the layers of threat source assessment

Master the nuances of threat landscape assessment with our Cyber Strategy

You May Also Like