Part of the Cyber Strategy Management series.
The next two pieces in our Cyber Strategy Management series explore an indispensable aspect of cybersecurity: threat landscape assessment. This process lays the groundwork for a robust cybersecurity strategy that is tailored to your organization’s specific threats and threat events.
Our first article, 1D. Review threat landscape (1/5), explores the most popular risk management frameworks employed in cybersecurity assessments. It explains the adjustments required to adopt these frameworks to organizational threat landscape review. This part also guides you through the necessary preparation activities and includes a wealth of resources that can help you conduct the threat landscape review.
Part 1 highlights:
- Most popular risk management frameworks
- Adaptations required for a threat landscape review
- Required preparation activities
- Resource recommendations for understanding threat sources and events
In 1D. Review threat landscape (2/5), we illuminate the process of identifying your organization’s crown jewels. These are the mission-critical assets whose compromise could significantly impact your business operations and reputation. The article provides a step-by-step process of creating a simple asset inventory, assessing business value and potential impacts on selected assets, and determining your crown jewels.
Part 2 covers:
- The concept and identification process of crown jewels
- The process for assessing business value and impact
- Selection of assets classified as crown jewels
These articles provide insights into initiating your threat landscape review and identifying your crown jewels, a cornerstone for developing a resilient cyber strategy.
I would like to extend our gratitude to Steve Dobson, Paul Holland and Ivo Gonçalves from the Information Security Forum (ISF) – their support and ISF research were invaluable in crafting a series of these articles on threat landscape review.
Get started on this exploration of threat landscape review, as we arm you with knowledge to fortify your most critical assets against looming threats.