Background
Faced with rapidly growing cyber threats, organizations and policymakers need a systematic way to categorize potential attacks and estimate consequences so that they can set priorities, allocate resources, and mitigate losses.
Our consultants have a range of experience in cyber operations, risk management, and software architecture development in the intelligence community, government, academia, and the private sector.
Stemming from rigorous research conducted at the University of Maryland, our award-winning approach has been integrated into our Tapestry tool, which converts technical attack scenarios into meaningful insights about potential impact to business processes.