Find Your Seccon Quiz | Critical Start
Our new MOBILESOC UI makes alert resolution and collaboration on the go more efficient and intuitive.
Learn real world attack and defense strategies with Adversarial Emulation and Active Defense training from TEAMARES
TEAMARES launches Breach Attack as a Service for quick testing whenever your environment changes.
Webinar Series | Once More unto the Breach | Lessons Learned from Billion Dollar Breaches


1. What is the expected level of Attacker for the organization?

The first step to determine your suggested SecCon level is to consider the skill of the attack likely for an environment. The attacker type determines the baseline SecCon level which helps identify the controls necessary to prevent, restrict, or detect the attacker.


2. How much does Information Technology impact the organization?

While some organizations only use IT for business convenience, it can also be used as a critical differentiator, to hold sensitive data, or control necessary systems to produce a good or service. The impact of downtime can significantly modify the controls that should be implemented.


3. What is the organization’s tolerance to Risk?

Understanding the culture of an organization is important to determining the extent of the mitigation strategy. Similar to a low vs. high deductible on car insurance, the lower the tolerance, the more significant the investment in security.


Question 1 of 3