Business Protection Blade

Business Protection Blade methodology provides a graphical positioning to establish your Cybersecurity Performance. We correlate in a two-dimensional matrix your Cybersecurity Efforts with your Ability to Protect Business Outcomes.

There are organizations with focus on security controls i.e., Compliance, while other are focused in protecting solutions against cyberthreats. Most of the companies lies inside that area which stands like a blade. Your performance is to balance your efforts with your results to improve your Cyber Resilience.

Business Protection Blade offers a visual snapshot and strategic roadmap that improves your Cybersecurity Performance.

Scoring

  • To assess your Cybersecurity controls maturity, we use Zero Trust maturity model with a selection of 36 CIS Controls classified under 6 Zero Trust domains or pillars
  • To assess your Ability to Protect your Business, we analyze 6 causes or means to suffer a Cybersecurity incident (Attack Vector) with a set of outcome-driven indicators related to an attack surface