4. Insider threats:
Employees or individuals with access to sensitive data pose an insider threat. Whether through malicious intent or inadvertent actions, insiders can compromise data security, making them a significant concern for organizations.
5. Threat landscape or threat intelligence:
Human behaviors alone are not malicious nor risky unless there is context and consideration for the ever-evolving panorama of potential risks, vulnerabilities, and dangers that may pose a threat to an organization’s information security.
6. Security posture and controls:
Most organizations already have sizable investments in cybersecurity readiness and capabilities to defend against potential threats and mitigate risk. These encapsulate the measures, strategies, policies, and practices put in place to protect information systems, networks, and data.