Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

Author(s): Cameron Smith, Wesley McPherson, James McCloskey, Elliot Lewis

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This phase of the blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis, guiding you through the following activities:

  • Review the STRIDE threat model
  • Understand Info-Tech's quantitative risk model
  • Assess the system threat and risk exposure

Use this phase as part of the full blueprint, Optimize Security Mitigation Effectiveness Using STRIDE.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019