3

Risk Assessment

In this chapter, you will explore risk assessments, how they are done, why they are important, what values are calculated, and how they are calculated. You will learn how risk managers and other blue team members work in this field. The calculation of risk is primarily done before a threat occurs. It is a way that an organization can attacks, usually during a quarterly period. In this chapter, two examples will be used. The first involves a fictional hospital based in Frankfurt. The other example will be about a medieval castle, and we will be placing the important blue team figures in the landscape of the period.

In this chapter, we’re going to cover the following main topics:

  • Following the NIST methodology
  • Asset inventory ...

Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.