Threat and Impact Analysis

Know the full impact before a threat strikes

Threat and impact analysis serves as an important part of the risk assessment process, as well as to ensuring effective business continuity and disaster recovery. Without a proper understanding of the impact of data loss and the possible nature of the threats to the data, it is difficult to understand the risks involved and to properly determine how it can be most effectively managed. The ability to identify risks and apply proportionate and pragmatic controls to mitigate those risks are fundamental to effective risk management.

Our approach

  • Identify and catalogue information and physical assets within the organisation
  • Understand potential threats to the organisation’s assets
  • Determine the impact of loss to the business using quantitative or qualitative analysis
  • Ensure effective readiness for the risk assessment process

Prism Infosec’s experienced security and information risk advisors assist organisations with the identification of key business assets and to explore the relative threats to them. Additionally they will identify the associated impacts of data loss, should any of the assets’ confidentiality, integrity or availability be breached.

We will use an agreed approach to effectively classify the threats and impacts, which may use an in-house scheme or an off-the-shelf method from industry recognised sources. Our consultants will hold a series of workshops with key business stakeholders to identify the relevant assets and to explore the associated threats to them and the impacts of loss.

Prism Infosec shall then produce a threat and impact analysis report and provide electronic information where required which describes the results of the analysis and that can be used as the input into an upcoming risk assessment process.

Email Prism Infosec, complete our Contact Us form or call us on 01242 652100 and ask for Sales to setup an initial discussion.

the-cyber-scheme
pci
Crest
cbest
CHECK Penetration Testing (Dark Logo)
Cyber Incident Exercising

Experiencing a security breach?
Contact the cyber security experts now