top of page

Member Content
The Community Library
Search. Read. Gain Insight.
Search


Supplier Cyber Security Frameworks and Controls
Step 3 in completing a supplier assessment is to answer: Applicable implementation of security frameworks Achieved compliance standards...
-
Sep 15, 20231 min read


X-Analytics: Control Effectiveness
The system, method, and apparatus for measuring, modeling, and reducing cyber risk contains a process for determining control effectiveness.
-
Sep 14, 20237 min read


Assessment Information
Step 2 in completing a supplier assessment is to answer: Industry Vertical and Operation Regions of the supplier Connectivity questions...
-
Sep 13, 20233 min read


X-Analytics: Inherent Risk
The system, method, and apparatus for measuring, modeling, and reducing cyber risk contains a process for determining inherent risk.
-
Sep 12, 20233 min read


Supplier Information
Step 1 in completing a supplier assessment is to: Select or create a new supplier Associate the supplier assessment with a...
-
Sep 11, 20231 min read


The X-Analytics Supply Chain Assessment
The Supply Chain assessment is a quick and efficient assessment of a supplier associated with an entity or profile. Learn how to create...
-
Sep 11, 20232 min read


X-Analytics: Impact
The system, method, and apparatus for measuring, modeling, and reducing cyber risk contains a process for determining impact.
-
Sep 11, 20235 min read


X-Analytics: Enumerations & Structure
The system, method, and apparatus for measuring, modeling, reducing, and addressing cyber risk contains a fixed enumeration and structure.
-
Sep 11, 20237 min read


X-Analytics: Threat
The system, method, and apparatus for measuring, modeling, and reducing cyber risk contains a process for determining threat.
-
Sep 10, 20235 min read


X-Analytics Methodology
The X-Analytics methodology describes the X-Analytics approach for determining cyber risk.
-
Sep 8, 202312 min read


NIST CSF
Defining Control Framework (or cyber maturity) is the fifth step in building an X-Analytics profile. This page tells you how to enter...
-
Sep 8, 20236 min read


Business Impact
Defining Business Impact is the fourth step in building an X-Analytics profile.
-
Sep 4, 20234 min read


Threat Likelihood
Defining Threat Likelihood is the third step in building an X-Analytics profile.
-
Sep 4, 20233 min read


Effective Communication with the CEO
You can use X-Analytics to effectively communicate your cyber resilience strategy with your chief executive officer (CEO).
-
Sep 2, 202310 min read


Effective Communication with Corporate Directors
You can use X-Analytics to effectively communicate your cyber resilience strategy with corporate directors (the Board).
-
Sep 1, 20235 min read
If something sparks, then start a conversation on the community forum.
bottom of page