Security Threat and Risk Assessment Process Template

Use this template to document the overall process and structure of your security risk assessment program.

Assess and Manage Security Risks – Phases 1-4

Use this blueprint to lay down the foundations for security risk management, including governance, assessment, and risk treatment.

Security Risk Management Maturity Assessment Tool

Use this tool to assess the current and target maturity of your security risk management program.

Security Risk Management RACI Tool

Use this tool to document the roles and responsibilities of your security risk management activities.

Security Risk Tolerance Assessment Tool

Use this tool to determine your organizational tolerance for security risk.

Security Threat and Risk Assessment Tool

Use this tool to identify and assess security threats and risks against a system or application.

Assess and Manage Security Risks

A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively...
  • guided implementation icon

TRA Process Map

Use this template to document your threat and risk assessment process.

Beyond Traditional IGA: Lumos Delivers Zero Trust Identity Governance for the Modern Enterprise

As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity...

Threat Landscape Briefing – August 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us