The Importance of Performing a Cybersecurity Threat Assessment
Mom! Dad! There’s a monster under my bed! Congratulations – you’ve conducted a threat assessment. Analyzing the tactics and techniques of threat actors—whether human, technical or environmental—results in better risk management.
Kristopher Hardy, GPEN, GWAPT, is a Cybersecurity and Data Privacy manager with Marcum Technology. Specializing in penetration testing, he has conducted hundreds of vulnerability assessments, penetration tests, and risk assessments for various corporations, hospitals, clinics, credit card processors, and Fortune 500 companies worldwide.