Optimize Security Mitigation Effectiveness Using STRIDE
Implement the right security controls based on the value of your data value and the risk exposure.
If you're already a member, click here to log in.
Major Business Pain Points
Methodology and Tools
Read the concise Executive Brief to find out how a mitigation effectiveness assessment can drive a successful and insightful security program that is right sized to the business.
1. Setup: Data and element classification
Establish a data and element categorization framework.
2. Data and element inventory
Identify valuable data and map where it flows.
3. Threat severity assessment
Appraise the organizational threat landscape.
4. Control maturity assessment
Catalog existing security controls and the threats they mitigate.
5. Outputs and interpretation
Interpret mitigation assessment results and identify security initiatives.
6. Implementation and maintenance
Integrate security initiatives into an actionable roadmap.
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.