{"id":5263,"date":"2025-10-08T20:36:47","date_gmt":"2025-10-08T20:36:47","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5263"},"modified":"2025-10-08T20:36:47","modified_gmt":"2025-10-08T20:36:47","slug":"how-risk-scores-are-assigned-to-threats-understanding-the-metrics-that-drive-security-decisions","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5263","title":{"rendered":"How Risk Scores Are Assigned to Threats: Understanding the Metrics That Drive Security Decisions"},"content":{"rendered":"<div class=\"elementor elementor-37524\">\n<div class=\"elementor-element elementor-element-9d85d4d e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-4f9830b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Here\u2019s the reality:<\/span><span> Most organizations are drowning in threat alerts, vulnerability reports, and security incidents. Security teams can\u2019t tackle everything at once, yet the leadership keeps asking \u201cWhat should we prioritize?\u201d Without proper risk scoring, you\u2019re essentially playing cybersecurity roulette with your business assets.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The World Economic Forum\u2019s Global Cybersecurity Outlook 2025 paints a stark picture \u2013 72% of organizations report increased cyber risks, while only 14% feel confident they have the right talent to handle them. That gap between threat volume and response capacity makes systematic risk scoring not just helpful, but absolutely critical for effective risk management<\/span><span><a href=\"https:\/\/fidelissecurity.com\/#citeref1\">[1]<\/a><\/span><span>.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The game-changer:<\/span><span> Smart risk scoring transforms those overwhelming security alerts into clear, actionable priorities that executives actually understand and can act upon.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4af01d3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Breaking Down Risk vs Threat vs Vulnerability<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1a3e303 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Let\u2019s get the fundamentals straight because these terms get tossed around interchangeably way too often in <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/threats-and-vulnerabilities\/effective-cyber-risk-assessment\/\">risk assessment<\/a> discussions.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Risk<\/span><span> is what keeps CISOs awake at night \u2013 it\u2019s the actual potential for loss when something bad happens. Think of it as the financial or operational damage your organization faces when threats meet <a href=\"https:\/\/fidelissecurity.com\/vulnerabilities\/\">vulnerabilities<\/a>. Risk managers use numerical values to quantify this potential and help allocate resources effectively.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Threats<\/span><span> are the bad actors and dangerous events lurking out there. It could be <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/threats-and-vulnerabilities\/ransomware-attacks\/\">ransomware<\/a>, disgruntled employees, natural disasters, or even simple human error. These potential threats exist whether your security is bulletproof or full of holes.<\/span><\/p>\n<p><span>Vulnerabilities<\/span><span> are the weak spots in your armor \u2013 outdated software, misconfigured systems, untrained users, or gaps in your processes. Unlike threats, you actually have control over most of these identified risks.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The relationship between risk vs threat vs vulnerability looks like this:<\/span><\/p>\n<p><span>Risk = Threat \u00d7 Vulnerability \u00d7 Impact<\/span><span>\u00a0<\/span><\/p>\n<p><span>But here\u2019s where it gets interesting for enterprise environments and risk scoring models:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Risk Score = Threat Event Frequency \u00d7 Vulnerability Severity \u00d7 Asset Value \u00d7 Control Effectiveness<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-933bd78 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Risk Scoring Methodologies Actually Work in Practice<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6eb593c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">The Numbers Game: Quantitative Risk Analysis<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-108c0fd elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW120813523 BCX8\"><span class=\"NormalTextRun SCXW120813523 BCX8\">When <\/span><span class=\"NormalTextRun SCXW120813523 BCX8\">you\u2019ve<\/span><span class=\"NormalTextRun SCXW120813523 BCX8\"> got solid quantitative data to work with, quantitative methods give you hard numbers that finance teams love. The FAIR model breaks this down beautifully for calculating risk <\/span><span class=\"NormalTextRun SCXW120813523 BCX8\">scores:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7880e40 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Loss Event Frequency = How often bad things happen to your specific assets based on historical data<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Loss Magnitude = What it costs when things go sideways (both direct costs and reputation damage)<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1f6b6f6 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW2021404 BCX8\"><span class=\"NormalTextRun SCXW2021404 BCX8\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW2021404 BCX8\"> a real-world example that <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW2021404 BCX8\">resonates:<\/span><span class=\"NormalTextRun SCXW2021404 BCX8\"> IBM\u2019s Cost of a Data Breach Report 2025 shows the global average breach cost dropped 9% to $4.<\/span><span class=\"NormalTextRun SCXW2021404 BCX8\">44<\/span><span class=\"NormalTextRun SCXW2021404 BCX8\"> million, but organizations without proper governance face significantly higher costs when incidents occur. This quantitative analysis helps organizations assess risk more accurately.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-dd67450 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">The Judgment Call: Qualitative Risk Assessments<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-159455a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW25004116 BCX8\"><span class=\"NormalTextRun SCXW25004116 BCX8\">Sometimes you <\/span><span class=\"NormalTextRun SCXW25004116 BCX8\">don\u2019t<\/span><span class=\"NormalTextRun SCXW25004116 BCX8\"> have perfect data, especially with emerging threats and emerging risks. <\/span><span class=\"NormalTextRun SCXW25004116 BCX8\">That\u2019s<\/span><span class=\"NormalTextRun SCXW25004116 BCX8\"> where qualitative risk analysis shines using scales that help <\/span><span class=\"NormalTextRun SCXW25004116 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW25004116 BCX8\"> potential <\/span><span class=\"NormalTextRun SCXW25004116 BCX8\">threats:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6fb3dc3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Likelihood categories: Almost Certain, Likely, Possible, Unlikely, Rare<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Impact levels: Catastrophic, Major, Moderate, Minor, Insignificant<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f52e83e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW27057709 BCX8\"><span class=\"NormalTextRun SCXW27057709 BCX8\"><strong>One security professional put it perfectly:<\/strong> \u201c<\/span><em><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW27057709 BCX8\">you<\/span><span class=\"NormalTextRun SCXW27057709 BCX8\"> definitely want to prioritize risks for internet-facing assets<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW27057709 BCX8\">.<\/span><span class=\"NormalTextRun SCXW27057709 BCX8\"> Your risk of exploitation goes <\/span><span class=\"NormalTextRun SCXW27057709 BCX8\">way up<\/span><span class=\"NormalTextRun SCXW27057709 BCX8\"> since your threat actors become anyone in the world instead of insider <\/span><\/em><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW27057709 BCX8\"><em>threats<\/em>\u201c.<\/span><span class=\"NormalTextRun SCXW27057709 BCX8\"> This approach helps prioritize risks effectively when managing various risks across the organization.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cd1f1f6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">The Best of Both Worlds: Semi-Quantitative Risk Scoring Process<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c9b1391 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW68430725 BCX8\"><span class=\"NormalTextRun SCXW68430725 BCX8\">This hybrid approach uses numerical scales (1-5 or 1-10) while still allowing for expert judgment when evaluating risks. <\/span><span class=\"NormalTextRun SCXW68430725 BCX8\">It\u2019s<\/span><span class=\"NormalTextRun SCXW68430725 BCX8\"> the sweet spot for most organizations implementing risk scoring methodologies \u2013 <\/span><span class=\"NormalTextRun SCXW68430725 BCX8\">objective<\/span><span class=\"NormalTextRun SCXW68430725 BCX8\"> enough for consistency, flexible enough for real-world complexity when you need to assess risk accurately.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5a25a84c e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-2a6756df e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-4b46f314 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Turn Risk Scoring Theory Into Action<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-15cdaa43 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Learn how Fidelis Elevate\u00ae calculates and prioritizes risk across your hybrid environment.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset coverage<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset importance<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Event severity<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat scoring<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f4d28e9 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/fidelis-elevate-asset-risk-calculation\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Datasheet<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4ba9a11a e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-577579e0 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2670a44 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-870200d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Industry-Standard Risk Assessment Frameworks<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-268f9d0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Common Vulnerability Scoring System (CVSS): The Universal Language<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6e51799 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW160715465 BCX8\"><span class=\"NormalTextRun SCXW160715465 BCX8\">The Common Vulnerability Scoring System gives every vulnerability a cyber risk score from 0.0 to 10.0. Here\u2019s how security teams use these cybersecurity risk scores for risk assessment <\/span><span class=\"NormalTextRun SCXW160715465 BCX8\">rating:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-272efce4 elementor-widget elementor-widget-Table\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\tCVSS ScoreRisk Assessment RatingRisk Management Strategy\t\t\t\t<\/p>\n<p>\t\t\t\t\t0.0InformationalFile it and forget it0.1-3.9Low priority risksNext patching cycle4.0-6.9Medium urgencyPlan remediation soon7.0-8.9High priority risksDrop everything mode9.0-10.0Critical risksWar room time\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8d6a30b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW118592798 BCX8\"><span class=\"NormalTextRun SCXW118592798 BCX8\">CVSS considers everything from how easy the attack is to pull off, what privileges an <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW118592798 BCX8\">attacker needs<\/span><span class=\"NormalTextRun SCXW118592798 BCX8\">, and what happens to your confidentiality, integrity, and availability when things go wrong. This helps organizations calculate risk scores based on standardized risk criteria.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d4d8fe5 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">NIST SP 800-30: The Government Gold Standard for Risk Management<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0032c2b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW239117040 BCX8\"><span class=\"NormalTextRun SCXW239117040 BCX8\">NIST\u2019s framework has become the go-to standard, with 68% of organizations adopting it according to 2025 <\/span><span class=\"NormalTextRun SCXW239117040 BCX8\">surveys<\/span><\/span><span class=\"TextRun SCXW239117040 BCX8\"><span class=\"NormalTextRun Superscript SCXW239117040 BCX8\"><a href=\"https:\/\/fidelissecurity.com\/#citeref2\">[2]<\/a><\/span><\/span><span class=\"TextRun SCXW239117040 BCX8\"><span class=\"NormalTextRun SCXW239117040 BCX8\">. The four-phase <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/cyber-risk-management-with-xdr-technology\/\">risk management<\/a> process works like <\/span><span class=\"NormalTextRun SCXW239117040 BCX8\">this:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d61aa9d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prepare your assessment scope and data collection requirements<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Conduct the actual threat analysis and risk assessment of identified threats<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Communicate findings to stakeholders who can make informed decisions<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Maintain continuous monitoring and risk scoring updates as the risk environment changes<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4c3b792 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW219231390 BCX8\"><span class=\"NormalTextRun SCXW219231390 BCX8\">What makes NIST powerful for risk managers is its comprehensive equation for risk:<\/span><\/span><\/p>\n<p><strong><span class=\"TextRun SCXW219231390 BCX8\"><span class=\"NormalTextRun SCXW219231390 BCX8\">Risk = Threat Source \u2192 Threat Event \u2192 Vulnerability \u2192 Predisposing Conditions \u2192 Impact<\/span><\/span><span class=\"TextRun SCXW219231390 BCX8\"><span class=\"NormalTextRun SCXW219231390 BCX8\">.<\/span><\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8b8d7d3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">FAIR: When You Need Dollar Signs for Risk Quantification<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4e6aa91 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The Factor Analysis of Information Risk model translates cyber risk into language executives speak \u2013 money. It\u2019s particularly valuable when you need to justify security budgets or compare <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-cyber-risk\/\">cyber risk<\/a> against other business risks, especially in the financial sector.<\/span><span>\u00a0<\/span><\/p>\n<p><em><strong>FAIR divides risk into two key components for accurate risk scoring:<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2d7f3a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Event Frequency: How often threats succeed against your assets<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Probable Loss Magnitude: The financial hit from both immediate costs and longer-term consequences<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-442bf642 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-5f390fe elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Building Your Risk Assessment Matrix for Managing Risks<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d5394d7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">The Five-Level Reality Check for Risk Score Calculation<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d42ec4d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW94545626 BCX8\">Most successful organizations standardize around five risk levels that everyone can understand when they need to prioritize risks and mitigate risks <\/span><span class=\"NormalTextRun SCXW94545626 BCX8\">effectively:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-268a8a16 elementor-widget elementor-widget-Table\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\tRisk LevelScore RangeLikelihood and ImpactRisk Management Decisions\t\t\t\t<\/p>\n<p>\t\t\t\t\tCritical20-25Almost certain\/CatastrophicAll hands on deckHigh15-19Very likely\/Severe damageExecutive war roomMedium9-14Could happen\/Noticeable hurtActive planningLow5-8Probably won&#8217;t\/Minor inconvenienceStandard opsVery Low1-4Lightning strike odds\/Barely noticedKeep an eye on it\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ae8dc4b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Making the Risk Matrix Work for Operational Risks<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-792d485 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW224664576 BCX8\"><span class=\"NormalTextRun SCXW224664576 BCX8\">Your risk matrix becomes a visual decision-making tool for the risk landscape. Plot likelihood against impact, and suddenly your priority becomes <\/span><span class=\"NormalTextRun SCXW224664576 BCX8\">crystal clear<\/span><span class=\"NormalTextRun SCXW224664576 BCX8\">. Security teams use this <\/span><span class=\"NormalTextRun SCXW224664576 BCX8\">to:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-76989cc elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Rank risks they&#8217;re dealing with based on real business impact and most significant risks<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Justify budget requests with quantitative data executives can&#8217;t argue with<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Track progress over time as threat landscapes shift and new cybersecurity threats emerge<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Focus limited resources where they&#8217;ll have maximum impact when allocating resources<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-19afc07 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-7eab8d3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Continuous Monitoring and Risk Scoring: Because Threats Don&#8217;t Wait<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-373ac7c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Real-Time Risk Adjustment in an Increasingly Uncertain World<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-55841b2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW218133782 BCX8\"><span class=\"NormalTextRun SCXW218133782 BCX8\">Static risk assessments died with quarterly patching cycles. Modern risk environments need final risk scores that update automatically <\/span><span class=\"NormalTextRun SCXW218133782 BCX8\">when:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-28aeb07 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">New <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">threat intelligence<\/a> comes in about active campaigns and emerging threats<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-vulnerability-scanning\/\">Vulnerability scanners<\/a> discover fresh weaknesses requiring immediate attention<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security measures get implemented or fail in the field<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Business priorities shift and asset values change across the organization<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b35ef18 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Learning from Enterprise-Scale Implementations<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2905946 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW142618161 BCX8\"><span class=\"NormalTextRun SCXW142618161 BCX8\">The Department of Defense CMRS system shows what enterprise-scale continuous monitoring and risk scoring looks like for managing risks across complex <\/span><span class=\"NormalTextRun SCXW142618161 BCX8\">environments:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4054daa elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Real-time data collection from millions of endpoints<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated risk score calculation using various quantitative methods<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integration with existing compliance frameworks and regulatory compliance requirements<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Executive dashboards that actually provide meaningful risk analysis<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a943494 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Contextual Risk Scoring with Fidelis Elevate\u00ae<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9358ce5 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW151038830 BCX8\"><span class=\"NormalTextRun SCXW151038830 BCX8\">Modern organizations <\/span><span class=\"NormalTextRun SCXW151038830 BCX8\">require<\/span><span class=\"NormalTextRun SCXW151038830 BCX8\"> risk scoring that goes beyond static vulnerability assessments. <\/span><span class=\"NormalTextRun SCXW151038830 BCX8\"><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Elevate<\/a>\u00ae<\/span><span class=\"NormalTextRun SCXW151038830 BCX8\"> addresses this challenge through contextual risk calculation that considers multiple factors <\/span><span class=\"NormalTextRun SCXW151038830 BCX8\">simultaneously:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-87c7b20 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Multi-dimensional Risk Calculation:<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7431abc elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW190477186 BCX8\"><span class=\"NormalTextRun SCXW190477186 BCX8\">Fidelis Elevate\u00ae<\/span><span class=\"NormalTextRun SCXW190477186 BCX8\"> calculates risk based on three critical <\/span><span class=\"NormalTextRun SCXW190477186 BCX8\">components:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-132f33c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset Coverage: Endpoint protection status, network visibility, <a href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/deception-deployment-considerations\/\">deception technology deployment<\/a><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset Importance: Business criticality based on role (mail servers, file servers) and data sensitivity (PII, customer data, source code)<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Severity of Current Events: Real-time threat scores using AI-based algorithms, MITRE ATT&amp;CK mapping, and vulnerability analysis<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bc71034 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Dynamic Risk Assessment:<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ca55a50 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Unlike traditional approaches that rely on periodic scans, Fidelis Elevate\u00ae continuously recalculates risk as the environment changes. Every new server, cloud account, container, endpoint, or network modification automatically triggers risk recalculation to maintain accurate threat prioritization.<\/span><\/p>\n<p><span>This contextual approach helps security teams shift from reactive fire-drill mode to <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/proactive-cyber-defense-approach\/\">proactive cyber defense<\/a> by providing threat-informed intelligence that enables efficient SOC operations and accurate threat prioritization.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-416de008 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-4c844fb6 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-75a7d83e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">4 Keys to Automating Threat Detection, Threat Hunting and Response<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2194a3b8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Maturing Advanced Threat Defense<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4 Must-Do&#8217;s for Advanced Threat Defense<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automating Detection and Response<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7da0307e elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/automating-threat-detection\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Whitepaper Now!<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6146c1b9 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-1c682881 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1f4611d e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-9eedb57 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Getting Your Data House in Order for Accurate Risk Scoring<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-980a6ca elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">What You Actually Need for Effective Data Collection<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a98d60e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW41041019 BCX8\"><span class=\"NormalTextRun SCXW41041019 BCX8\">Accurate risk scoring depends on pulling together relevant data from multiple <\/span><span class=\"NormalTextRun SCXW41041019 BCX8\">sources:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-488e069 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat intelligence feeds with current attack trends and actor capabilities<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vulnerability scanners showing what&#8217;s actually broken in your environment<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset management databases with real valuations and business criticality<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Historical incident records proving what attacks cost you before and supporting factor analysis<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security control metrics measuring whether your defenses actually work for mitigation strategies<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-61c7543 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Enhanced Visibility Through Integrated Platforms<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0a89a51 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Modern risk scoring requires comprehensive data integration across multiple security domains. Fidelis Elevate\u00ae demonstrates this approach by centralizing security data from <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/what-is-ndr-network-detection-and-response\/\">NDR<\/a>, EDR, IT\/OT systems, vulnerability scans, CNAPP, CASB, and Active Directory into a unified view.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Patented <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/deep-session-inspection\/\">Deep Session Inspection<\/a><\/span><span> provides visibility that traditional tools miss by inspecting traffic across all ports and protocols, including threats in nested files, encrypted traffic, and ephemeral containerized workloads. This comprehensive data collection enables more accurate risk calculations by identifying threats that would otherwise remain hidden.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Real-time <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/deception\/asset-discovery-and-risk-mapping-using-deception\/\">Asset Discovery and Risk Profiling<\/a><\/span><span>: The platform continuously maps terrain across on-premises and cloud networks, providing real-time inventory with risk profiling that supports dynamic risk score calculations as environments change.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e722435 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Common Risk Formulas That Work for Different Risk Events<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-391d65a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Different organizations need different approaches when they calculate risk, but these core formulas cover most situations for risk score calculation:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Simple version<\/span><span>: <\/span><span>Risk Score = Likelihood \u00d7 Impact<\/span><span>\u00a0<\/span><\/p>\n<p><span>Business version: Risk Score = (Threat Frequency \u00d7 Vulnerability) \u00d7 (Asset Value \u00d7 Impact) \u00d7 (1 \u2013 Control Effectiveness)<\/span><span>\u00a0<\/span><\/p>\n<p><span>Financial version: Annual Loss Expectancy = Single Loss Expectancy \u00d7 Annual Rate of Occurrence<\/span><span>\u00a0<\/span><\/p>\n<p><span>The equation for risk varies based on your specific risk management strategy and what risk criteria matter most to your organization.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-57f6b11 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-35794eb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Risk Scoring Techniques That Make a Difference<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f40e892 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Machine Learning Meets AML Risk Scoring Model Applications<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cff91f9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW175489048 BCX8\"><span class=\"NormalTextRun SCXW175489048 BCX8\">Anti-Money Laundering risk scoring has pioneered some techniques that work brilliantly for cybersecurity when organizations need to calculate risk <\/span><span class=\"NormalTextRun SCXW175489048 BCX8\">accurately:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cbb8755 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-intelligence\/detecting-attack-patterns-in-threat-feeds\/\">Pattern recognition that spots anomalous behavior<\/a> humans miss<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Self-adjusting risk factors based on historical data and what actually happens<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Predictive analytics for threats that haven&#8217;t materialized yet but pose significant risks<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Smart filtering that <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/xdr-security\/reduce-false-positives-and-ensure-data-accuracy-with-xdr\/\">cuts down false positives<\/a> dramatically when evaluating risks<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2815099 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Threat Analysis and Risk Assessment Integration<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a552496 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW121887618 BCX8\"><span class=\"NormalTextRun SCXW121887618 BCX8\">The World Economic Forum\u2019s research reveals some eye-opening trends that should influence your risk scoring process and how you <\/span><span class=\"NormalTextRun SCXW121887618 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW121887618 BCX8\"> potential <\/span><span class=\"NormalTextRun SCXW121887618 BCX8\">threats:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-49b4626 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">47% of organizations worry about GenAI-enhanced attacks affecting their risk assessment<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">60% say geopolitical tensions affect their security strategy and risk management practices<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">31% of CEOs cite cyber espionage as a top concern requiring proactive measures<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">66% expect AI to significantly impact cybersecurity and their ability to quantify risk<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e82ae09 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW127829401 BCX8\"><span class=\"NormalTextRun SCXW127829401 BCX8\">These risk factors need to be baked into your threat likelihood calculations, not treated as separate issues when conducting risk analysis<\/span><\/span><span class=\"TextRun SCXW127829401 BCX8\"><span class=\"NormalTextRun Superscript SCXW127829401 BCX8\"> <a href=\"https:\/\/fidelissecurity.com\/#citeref1\">[1]<\/a><\/span><\/span><span class=\"TextRun SCXW127829401 BCX8\"><span class=\"NormalTextRun SCXW127829401 BCX8\">.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1f4b92f e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-2df409b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Resource Allocation Based on Real Priorities and Identified Risks<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f803799 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Where to Spend Your Limited Budget in Higher Risk Environments<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7347774 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The cybersecurity talent shortage has grown 8% since 2024, with only 14% of organizations confident in their staffing levels. That makes smart resource allocation absolutely critical when managing the most critical risks:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Critical\/High risks<\/span><span> (15-25 points) get immediate executive attention and emergency budgets. Think war room response with all hands on deck when you need to mitigate risks immediately.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Medium risks<\/span><span> (9-14 points) get planned attention within normal budget cycles. These are your quarterly security projects for managing identified risks systematically.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Low risks<\/span><span> (1-8 points) get handled through routine operations. Monitor them, but don\u2019t panic about immediate action when allocating resources efficiently.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-87db6a1 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Decision Framework That Works for Risk Management Decisions<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d00f484 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW208171792 BCX8\"><span class=\"NormalTextRun SCXW208171792 BCX8\">Use your cybersecurity risk scores to drive systematic decisions <\/span><span class=\"NormalTextRun SCXW208171792 BCX8\">about:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bee14dc elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Which potential risks deserve the 45% of organizations&#8217; top concern about ransomware<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">How to justify security investments when budgets get tight and you need to allocate resources effectively<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Where to focus limited expert talent for maximum impact on the most significant risks<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What to tell executives when they ask &#8220;Are we secure?&#8221; and want to understand our risk occurring probability<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ae569c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW218506539 BCX8\"><span class=\"NormalTextRun SCXW218506539 BCX8\">Financial institutions particularly <\/span><span class=\"NormalTextRun SCXW218506539 BCX8\">benefit<\/span><span class=\"NormalTextRun SCXW218506539 BCX8\"> from this structured approach to risk management practices.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8e5f232 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-a0dab0f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Navigating Today&#8217;s Complex Risk Environment and Significant Challenges<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-55b82ef elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Current Reality Check for the Risk Landscape<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e26f7a2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The 2025 cybersecurity landscape presents significant challenges that traditional risk scoring wasn\u2019t designed for:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Geopolitical chaos<\/span><span>: Nearly 60% of organizations now factor international tensions into their security planning and risk assessment matrix<\/span><span>\u00a0<\/span><\/p>\n<p><span>AI-powered attacks<\/span><span>: 66% expect artificial intelligence to reshape cybersecurity, but only 37% have processes for evaluating AI security before deployment, creating new operational risks<\/span><span>\u00a0<\/span><\/p>\n<p><span>Supply chain nightmares<\/span><span>: 54% of large organizations identify supply chain issues as major barriers to <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/enterprise-cyber-resilience\/\">cyber resilience<\/a> when trying to assess risk comprehensively<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9bd9165 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Practical Solutions That Work for Risk Mitigation Strategies<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ca3a176 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW256591418 BCX8\"><span class=\"NormalTextRun SCXW256591418 BCX8\">Smart organizations address these modern challenges when implementing risk management practices <\/span><span class=\"NormalTextRun SCXW256591418 BCX8\">by:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1c3861a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Starting with simple risk scoring models and adding complexity gradually &#8211; don&#8217;t try to boil the ocean on day one<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establishing automated data collection and updating to handle the 72% increase in reported cyber risks and various risks organizations face<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Customizing risk criteria for organizational context rather than using generic templates when you need to assess risk accurately<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Building in factors for GenAI-enhanced <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/cyberattacks\/what-is-social-engineering\/\">social engineering<\/a> affecting 42% of organizations and creating new categories of potential threats<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c75ca68 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8181511 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Risk Score Formula in Threat Modelling and Final Risk Score Calculations<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a743647 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>When implementing threat risk assessment processes, organizations need to understand how to calculate risk using proven methodologies. The risk formula becomes more sophisticated in threat modelling contexts:<\/span><span>\u00a0<\/span><\/p>\n<p><span>Comprehensive Risk Score = (Threat Capability \u00d7 Threat Motivation \u00d7 Vulnerability Exploitability) \u00d7 (Asset Value \u00d7 Business Impact) \/ (Existing Controls Effectiveness)<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a9115d1 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>This approach helps organizations calculate risk scores that reflect the complexity of modern cybersecurity threats while providing the numerical value needed for risk management decisions.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Risk scoring isn\u2019t just another compliance checkbox \u2013 it\u2019s the foundation that transforms cybersecurity from chaotic firefighting into strategic business protection. Whether you choose CVSS, FAIR, NIST, or build your own hybrid approach for your risk scoring methodology, the key is consistency, automation, and keeping it tied to real business impact. Modern platforms like <a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Elevate<\/a>\u00ae demonstrate how contextual risk scoring, integrated data collection, and continuous monitoring work together to provide the dynamic risk assessment capabilities today\u2019s threat environment demands. As the World Economic Forum\u2019s research clearly shows, cyber threats aren\u2019t slowing down, so your risk scoring process needs to be as dynamic and adaptive as the threats you\u2019re defending against when you allocate resources and make informed decisions about managing risks.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-15ad3e3 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-717691a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><em><strong>Citations:<\/strong><\/em><\/p>\n<p><a href=\"https:\/\/fidelissecurity.com\/#cite1\">^<\/a><a href=\"https:\/\/reports.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2025.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/reports.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2025.pdf<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite2\">^<\/a><a href=\"https:\/\/www.cybersecuritytribe.com\/articles\/nist-ranked-2025s-most-valuable-cybersecurity-framework\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cybersecuritytribe.com\/articles\/nist-ranked-2025s-most-valuable-cybersecurity-framework<\/a><\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/risk-scoring-methodology-for-cyber-threats\/\">How Risk Scores Are Assigned to Threats: Understanding the Metrics That Drive Security Decisions<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Here\u2019s the reality: Most organizations are drowning in threat alerts, vulnerability reports, and security incidents. Security teams can\u2019t tackle everything at once, yet the leadership keeps asking \u201cWhat should we prioritize?\u201d Without proper risk scoring, you\u2019re essentially playing cybersecurity roulette with your business assets.\u00a0 The World Economic Forum\u2019s Global Cybersecurity Outlook 2025 paints a stark [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5263"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5263"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5264"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}