Visit our education center and our FAQ page .

Background

Threat Sketch Solutions

  • 50+ individual business language mitigations
  • Highly structured, queryable format
  • Each mitigation is mapped to:
    • NIST Cybersecurity Framework
    • CIA Triad
    • Mitigation method
    • Loss type
    • Professional domain
    • NIST 800-53
  • Peer reviewed research
  • Business language legal summaries
  • Data law & risk landscape correlation analysis
  • Over 350 data laws at local, state & federal level
  • Aligned with:
    • NIST Cybersecurity Framework
    • Threat actors
    • Data types
    • Stakeholders
  • Vendors vetted based on business specific cybersecurity criteria
  • Searchable by mitigation or keyword
  • Sorted by professional domain, geographic location, and capabilities
  • Vendors aligned to specific business sector and size
  • Peer reviewed research
  • Business language legal summaries
  • Data law & risk landscape correlation analysis
  • Over 350 data laws at local, state & federal level
  • Aligned with:
  • NIST Cybersecurity Framework
  • Threat actors
  • Data types
  • Stakeholders
    • 50+ individual business language mitigations
    • Highly structured, queryable format
    • Each mitigation is mapped to:
      • NIST Cybersecurity Framework
      • CIA Triad
      • Mitigation method
      • Loss type
      • Professional domain
    • Vendors vetted based on business specific cybersecurity criteria
    • Searchable by mitigation or keyword
    • Sorted by professional domain, geographic location, and capabilities
    • Vendors aligned to specific business sector and size

 

  • ts governance™ is a set of cybersecurity guides designed to help organization leaders understand and manage cyber risk within their unique sector.

 

    • Cybersecurity: A Business Solution™ is a concise guide to managing cybersecurity from a business perspective, written specifically for the leaders of small and medium businesses.

 

Coming Soon!

Threat Sketch provides a collection of video content adapted from our written materials. This content helps cybersecurity professionals better communicate with their customer base through an audio/ visual medium.