Optimize Security Mitigation Effectiveness Using STRIDE
Understand how well your security countermeasures are working for you.
Book This Workshop
Making security decisions without the right information can result in:
- Unmitigated vulnerabilities allowed to persist.
- Potentially damaging security incidents.
- Wasted financial and human resources.
Understanding the threat landscape and mitigation effectiveness leads to:
- Informed business and security decisions.
- A defensible and quantified security roadmap.
- A proactive and right-sized security program.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Setup: Risk Tolerance, and Data and Element Inventory
The Purpose
- Discuss the organizational risk tolerance / risk management strategy.
- Establish a foundational frame for data and element categorization.
Key Benefits Achieved
- A map is created of the valuable data and which assets it flows through
Activities: | Outputs: | |
---|---|---|
1.1 | Validate pre-work (data classification, IT systems element inventory, rough data mapping). |
|
1.2 | Review Info-Tech’s quantified risk model and STRIDE threat model. |
|
1.3 | Begin threat modeling activity. |
|
Module 2: Threat Severity Assessment
The Purpose
- Perform a detailed analysis of the organizational threat and risk exposure.
Key Benefits Achieved
- Understand Info-Tech’s quantified threat severity model
- A map of the systems threat landscape
Activities: | Outputs: | |
---|---|---|
2.1 | Complete threat modeling activity |
|
Module 3: Control Maturity Assessment
The Purpose
- Catalog all the existing security capabilities and map them to the threats that they mitigate.
Key Benefits Achieved
- Security control capabilities and maturity mapped to the system threats
Activities: | Outputs: | |
---|---|---|
3.1 | Review the STRIDE security traits and threat – countermeasure relationships. |
|
3.2 | Perform a security control and maturity assessment. |
|
3.3 | Identify gap initiatives to address unacceptable risks. |
|
Module 4: Gap Initiative Identification and Prioritization
The Purpose
- Identify security gaps based on threat-control assessments.
- Create a prioritized roadmap and plan to implement gap initiatives.
Key Benefits Achieved
- Clearly identified and documented security gaps
- Prioritized list of initiatives required to address security gaps to the organizational needs
Activities: | Outputs: | |
---|---|---|
4.1 | Prioritize gap initiatives. |
|
4.2 | Make a plan to incorporate the gap initiatives into a security roadmap, and discuss how to integrate risk model into overall risk management decisions. |
|