With insights on threats, competitors, and technology solution providers, the second step in developing a cybersecurity strategy entails sorting and analyzing each independently and collectively to uncover areas of exposure and identify potential remedies. How are peers in the industry considering those threats and securing their environment? What risks are organizations facing today and how might they evolve in future states? 

In the second episode of three in our series on building a cybersecurity strategy playbook, Partners Michael Gurau and Ben Matthews, along with CISO Matthew Rosenquist, discuss how to understand and synthesize these data streams for a clear view of the nature and depth of cybersecurity challenges that a strategy playbook will address.

To stay up-to-date on the latest episodes of our Cybersecurity Deconstructed series, please complete the form below.

[contact-form-7 id=”8289″ title=”Cybersecurity Deconstructed Subscription Form”]

Leadership & Oversight

Michael Gurau | Partner | [email protected]
Ben Matthews | Partner | [email protected]