Sign-up for a RiskTree trial >>

Cyber Security News and Insights

Category: Risk Management

Why are bad actors targeting CNI? Which sectors are most at risk? And what can be done to offer better protection?
xr:d:DAF9071otZ4:31,j:8909670513969788479,t:24041116
In this article, we discuss the approach to creating GovAssure profiles. We didn’t want to assume that government could use the existing CAF baseline profile based on a different threat profile to the private sector. Read more about how we ensured that the chosen profile reflected the threats faced by government.
using the CAF in practice
A brief guide to using the Cyber Assessment Framework (CAF) in practice. If you’ve read our earlier blogs about the Cyber Assessment Framework (CAF), you'll know that it isn’t intended to be a checklist - find out more about outcome level dependencies and chord diagrams...
THE 5 'W's of the CAF
If you want to know more about the Cyber Assessment Framework you've come to the right place. In this article, we'll explain the what, why, who, where and when of the CAF!
Pass on probaility impact graphs
Probability/impact graphs have been used for a long time to assess risk, especially in spreadsheet-based risk registers. They give a misleading impression of risk levels though and hence organisations should be using alternative, and better approaches.
Tony Badsey-Ellis receiving his chartered cyber security professional certificate
The UK Cyber Security Council ushered in the UK's first cohort of chartered cyber security practitioners this October. This followed the launch of its first pilot schemes last year, with an awards ceremony taking place in London. Tony Badsey-Ellis and Tony Beadle from 2T Security were among the first 40 to gain chartered status.
Understanding Risk Banner (800 × 400px) (1)
When you start using RiskTree, a powerful risk assessment tool, it's important to grasp the nuances of different risk types: intrinsic, residual, and target. These terms sometimes spark confusion, as their meanings aren't always universally clear. Let's demystify these concepts for a clearer understanding.
bow-ties (800 × 400px) (800 × 400px) (2)
This post details why we implemented bowtie analytics in RiskTree. And, how RiskTree users can now build bow tie diagrams from their existing trees.
GovAssure logo
Throughout the development and implementation of GovAssure, 2T Security has closely collaborated with the Government Security Group and the National Cyber Security Centre. Read about our expertise in CAF.
how to implement Boolean Logic in risktree
Boolean Logic is a form of algebra that is centered around three simple words known as Boolean Operators: “Or,” “And,” and “Not.” If you're wondering how how to apply this in RiskTree, this post will help!
News Categories: