Skip to main content

Threat Modeling

Home > Security > Threat Modeling

Assessing Your Threats

Threat Modeling, Assessment, & Planning: Understand Your Threat Landscape

How should you spend your security budget? Where should you put your time, money, and resources? That is a question that many organizations ask and often
they do not have good answers outside of the buzzwords seen in the cyber security blogs and media. The result is typically to find out after the next incident that the effort was put in the wrong place. This issue can be addressed by proactive Threat Modeling and Risk Assessment.

What is Threat Modeling?

Crossconnect’s Least Privilege Approach

Threat modeling is the process of collaboratively discussing and analyzing past, present, and future security threats to the organization. Crossconnect defines these threats in depth and how they affect the organization specifically. Crossconnect Engineering’s Threat Assessment combines multiple processes into a single product: Threat Modeling, Risk Assessment, and a Security Vision Plan.

What Is Risk Assessment?

Crossconnect takes the list of threats and scores them based on likeliness and impact. Then an overall Risk score is
assigned. Finally, we address how we should deal with these risks. Will we mitigate them and with what type of security control (Mitigation)? Or will we address them with Cyber Security Insurance (Transfer)? Or will we accept them?

What is a Security Vision Plan?

Crossconnect takes this ordered list of threats and their risk score and creates a vision plan on how security controls will
be implemented to mitigate the defined risks. This provides a roadmap to follow and to guide future efforts.