Please ensure Javascript is enabled for purposes of website accessibility
top of page
Consilience 360 Unifying Business, Science and Security Methodology

methodology

Consilience: The principle that evidence from different,

unrelated sources can converge on strong conclusions. 

assessment

Assess technical vulnerabilities and cybersecurity risk on an enterprise scale

Specify risk-relevant processes, workflows and cultural artifacts that can lead to information compromises

Examine cybersecurity risk in context and in light of business requirements

Create models, frameworks and metrics that enable deeper insights into cyber security risk and implications.

Recommend security controls that align with the organizational tolerance for risk

Suggest countermeasures to state-sponsored information collection efforts in high-risk countries

CYber security Risk assessment

Board Engagement

Enterprise Level Assessment

Security Governance

Root Causes &

Systemic Risk Factors

Resilience

Macroscopic Security

Controls

Risk-Relevant Organizational Features

Technology & Business

Operations Assessment

External View

Internal View

Attack Surface Discovery

Third party Dependencies

Vulnerability

Scan

Independent

Ratings

Recon Tools

Functional Discovery:

Interviews on Business Processes, Cyber and Physical Security Technologies, Information Assets

CIS Controls

Gap Analysis

Basic Hygiene

Foundational

Advanced

ANALYSIS: RISK-RELEVANT OBSERVATIONS, CORRELATIONS, VULNERABILITIES & RECOMMENDATIONS ON REMEDIATION.

bottom of page