Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare


148214bab00339e729a3d7741a284f4016f7ef306a5ed35be72a6029c69e15b7.png

There are many approaches to conduct a strategic cybersecurity risks assessment.  This is one of my favorite ways, using a Threat Agent Risk Assessment (TARA) methodology. 

This paper was authored by Tim Casey, David Houlding, and I while we were at Intel.  It showcases how to understand the origins of cybersecurity threats to an organization.  The resulting knowledge can greatly improve the management of cyber risks!

I use the same approach when looking at digital risks in the #cryptocurrency world!

The full Intel solution brief “Improving Healthcare Risk Assessments to Maximize Security Budgets” can be downloaded here:

https://www.slideshare.net/MatthewRosenquist/improving-healthcare-risk-assessments-to-maximize-security-budgets

How do you rate this article?

13


Matthew Rosenquist
Matthew Rosenquist

Cybersecurity Strategist specializing in the evolution of threats, opportunities, and risks in pursuit of optimal security for our digital world.


Cybersecurity Tomorrow
Cybersecurity Tomorrow

Cybersecurity strategy perspectives for the emerging risks and opportunities of securing our digital world. The insights of today will lead to tomorrow's security, privacy, and safety foundations.

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.