top of page
IL7 LOGO -03.png


Introduction to IL7's approach to Risk

There are three types of threat to information assets facing organisations today[1]. There is the insider threat. There is the cyber threat. Thirdly there is the cyber threat that feeds off the low cognisance of being a target, otherwise termed the low ‘threat IQ’, of the insider[2]. What needs to be established is which one threatens the organisation. Inside these three threats are many variants that feed off whichever vulnerabilities an organisation has at any particular time. And they vary increasingly if that organisation becomes a target, because it has something others want, financial, commercial or political, or because it represents something others find offensive.


Analysing which particular threats are risks to an organisation requires knowledge of the cyber variants and how they exploit vulnerabilities. Managing that risk requires particular skill to balance the most effective defences needed for the ongoing successful business of the organisation. IL7 has the technical knowledge to build perimeter defences against the cyber threat, to employ analytics and monitoring against the cyber threat and to utilise communication and consultancy to galvanise a corporate culture and reduce the threat IQ. The key is to understand the business and what business assets are valuable. Identify vulnerabilities and introduce controls to eliminate or mitigate them. IL7 has the experience to assess risks that a business can take to exploit a business opportunity and the expertise to identify measures to mitigate any effect if the risks taken become reality.


[1] For the purposes of this exercise, acts of God and natural disasters are treated as hazards, insurable risks, treated with back-up, business continuity. This paper concentrates on the risk to information assets.

[2] The ‘insider’ here is a collective term that includes the privileged user, the normal user, the service provider, service consumer or supplier as all could be duped into being infected in a way that can endanger the target.

Click on the PDF to follow this

bottom of page