Risk library

To carry out any security risk assessment in line with internationally accepted risk guidelines, you must answer three questions:

What are you protecting?
What are you protecting it from?
How vulnerable is it?
Risk_Library_Montage_1920x1080px_4_45 (1) (1)
Asset_Library_On_Screen_ss2153706577_1_1_1_11zon_50

Asset library

What are you protecting?

Your asset library is your prioritised register of all the assets you are protecting. It will be tailored for your purposes and is easy to update.

Assets include: People, Physical Assets, Information, ICT and Processes.

Your register will list all assets in order of importance or criticality.

Threat library

What are you protecting it from?

Your security threat library contains a geo-located list of:

  • Activities e.g. Theft
  • Actors e.g. Criminals
  • Drivers e.g. Financial gain
  • Intent e.g. Determined
  • Capability e.g. Moderate
  • Threat level e.g. High
Threat_On_Screen_SS654188995-1_1_1_1_11zon_50
Control_Library_Tablet_close_SS1881180316_11zon_50

Control library

How vulnerable is it?

Carrying out a security control audit is essential to understand the vulnerability of your critical assets to the threats they may be exposed to.

Your security control library is a register of protective and reactive security controls linked to the risks they mitigate.

The security control audit allows you to assess the effectiveness of each security control, and then HawkSight re-evaluates the risk level in real time using our proprietary algorithm.