Abstract
Connected to, and contained within, imperfect technology are assets organizations deem as critical… and attackers find valuable. The ability to clearly identify and describe this observation in meaningful ways is a critical step to addressing the cybersecurity problem—so that it may be managed as a risk. With the risk actually understood, organizational functions may become clearer, ...