Risk Assessment Methodology

Our Risk Assessment Methodology is based on a simple 2-axis model consisting of 4 main categories.

The vertical axis splits content into non-technical and technical categories, whilst the horizontal axis splits content into individual and surrounding categories. On the basis of this, the categories created are the following:

  1. Technical Individual
  2. Technical Surrounding
  3. Non-Technical Surrounding
  4. Non-Technical Individual

This risk assessment methodology has been adapted for our cyber awareness (cyber hygiene) and compliance (data protection, anti-corruption and business ethics and anti-money laundering) courses but can be used regardless of industry and study topics, being proven in various other contexts such as forestry, disinformation, educational emergency provisions and more.

Our Risk Assessment Methodology is based on a simple 2-axis model consisting of 4 main categories.

Risk Matrix Categories

A Single Framework to Cover All Risks

Non-Technical Individual

Threats and attack vectors that represent the individuals personal take on the domain and topics at hand

Non-Technical Surrounding

Threats and attack vectors that represent the organization the individual is figuring in

Technical Individual

Threats and attack vectors that come from the technical elements the individual uses personally in day to day activities

Technical Surrounding

Threats and attack vectors that come from the surrounding technical environment the individual is exposed to

Contact Us for Demo

Talk to our experts to find the best training solution and content for your cybersecurity and compliance needs from our arsenal.

Contact Us for Demo

Talk to our experts to find the best training solution and content for your cybersecurity and compliance needs from our arsenal.