Our Methodology

Our Risk Assessment Methodology is based on a simple 2-axis model consisting of 4 main categories. The Vertical Axis splits content into Non-Technical and Technical Categories, whilst the Horizontal Axis splits content into Individual and Surrounding Categories. On the basis of this, the Categories created are the following:

1. Technical Individual

2. Technical Surrounding

3. Non-Technical Surrounding

4. Non-Technical Individual

This Risk Assessment Methodology has been adapted for our Cyber Hygiene and Compliance (Data Protection, Anti-Corruption/Business Ethics and Anti-Money Laundering) Courses but can be used regardless of industry and study topics, being proven in various other industries such as Forestry, Disinformation, Educational Emergency Provisions and more.

Individual Topics

The upper half of the risk radar consists of individual topics. These topics are exclusively related to the trainee completing the course. These topics consist both of non-technical and technical elements.

Surrounding Topics

The lower half of the risk radar consists of surrounding topics. These topics are related to the environment the trainee completing the course is in. These topics consist of both non-technical and techincal elements.

Technical Topics

The right half of the risk radar consists of purely technical topics. These topics are based on technical knowledge and can be taught to the trainee completing the course. These topics consist of both individual and surrounding elements.

Non-Technical Topics

The left half of the risk radar consists of purely non-technical topics. These topics are based on non-technical takes such as attitude and organizational behaviour, which are often times difficult to impact. These topics consist of both individual and surrounding elements.

A Single Framework to Cover All Risks

Non-Technical Individual

Threats and attack vectors that represent the individuals personal take on the domain and topics at hand

Non-Technical Surrounding

Threats and attack vectors that represent the organization the individual is figuring in

Technical Individual

Threats and attack vectors that come from the technical elements the individual uses personally in day to day activities

Technical Surrounding

Threats and attack vectors that come from the surrounding technical environment the individual is exposed to

Contact Us for Demo

Talk to our experts to find the best training solution and content for your cybersecurity and compliance needs from our arsenal.