Book traversal links for Principle 14: Elaborate Requests for Information (RFIs) and Tailored Threat Assessments
Principle 14: Elaborate Requests for Information (RFIs) and Tailored Threat Assessments
No: 43065348 | Date(g): 27/2/2022 | Date(h): 26/7/1443 |
Effective from Feb 27 2022 - Feb 26 2022
To view other versions open the versions tab on the right
Member Organizations should be able to provide, upon request, detailed information (e.g. cyber threats, trends, events, and malware or tools) related to possible cyber attacks that could target them. These can be structured, for example, as threat actor profiles, country profiles, malware or tools analyses, or cyber trend studies.
Member Organizations, based on the intelligence produced, should be able to perform tailored threat assessments to define the relevancy and level of potential threats, as well as the probability of attacks.
The CISO is responsible for validating the quality and relevance of the information. This information can be of particular interest to senior and executive management, business owners, owners of information assets, etc. This information is particularly valuable for instance when defining business strategies, planning security interventions, or following significant cyber incidents in the sector or in the country.