{"id":25181,"date":"2019-02-12T13:00:19","date_gmt":"2019-02-12T13:00:19","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542662"},"modified":"2019-02-12T13:00:19","modified_gmt":"2019-02-12T13:00:19","slug":"cyber-risk-index-a-guide-for-cisos-and-it-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/","title":{"rendered":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"178\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-300x178.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-300x178.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-768x456.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-640x380.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-440x261.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800-380x226.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/20181017040317074-96-RKyIKNT-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>Trend Micro has partnered with the Ponemon Institute to develop a new Cyber Risk Index (CRI), which is intended to help CISOs and their IT Security teams better understand the current cyber risk compared to similar businesses of their size and industry. The CRI is based on a survey conducted by Ponemon to more than 1,000 IT professionals in the US from small, medium and large businesses and it looks at two aspects: How prepared are organizations to protect their data and systems versus the current threats targeting them. Our plan is to run the CRI every six months to obtain trending data to see if the CRI improves or not over time.<\/p>\n<p>The CRI is based on a -10 to +10 scale with -10 being high risk and +10 being minimal risk. The results show that businesses overall are at an elevated risk of cyber threats with a score of -0.15. We also broke out the results based on company size, which shows that small businesses are at the highest risk at -0.59.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-542663\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri.jpg\" alt=\"\" width=\"919\" height=\"536\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri.jpg 919w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-300x175.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-768x448.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-640x373.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-900x525.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-440x257.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri-380x222.jpg 380w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\"\/><\/p>\n<p>The good news is enterprise businesses responded with a moderate risk index level. When we break out the results by industry, for those industries where we had enough responses for a good statistical average they all showed elevated risk levels with the highest risk associated with services, public sector, retail, health &amp; pharmaceutical industries.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-542664\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1.jpg\" alt=\"\" width=\"951\" height=\"349\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1.jpg 951w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-300x110.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-768x282.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-640x235.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-900x330.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-440x161.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/cri1-380x139.jpg 380w\" sizes=\"auto, (max-width: 951px) 100vw, 951px\"\/><\/p>\n<p>Let\u2019s look at some of the more interesting results from the survey based on all respondents.<strong>\u00a0<\/strong><\/p>\n<p><strong>Cyber Attacks Will Likely Occur<\/strong><\/p>\n<table>\n<tbody readability=\"2\">\n<tr readability=\"4\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Likelihood of a data breach of customer data in next 12 months: 77% likelihood<\/li>\n<li>Likelihood of a data breach of critical data (IP) in next 12 months: 80% likelihood<\/li>\n<li>Likelihood of one or more successful cyber attacks in next 12 months: 80% likelihood<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The above results show that our respondents are not confident that they can thwart an attack, and believe some of their most valuable data will be exfiltrated.<strong>\u00a0<\/strong><\/p>\n<p><strong>Critical Data is at Risk<\/strong><\/p>\n<p>The top four things at highest risk of loss or theft are (in order of highest risk):<\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>R&amp;D Information<\/li>\n<li>Trade Secrets<\/li>\n<li>Customer Accounts<\/li>\n<li>Company-confidential information<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The good news is our respondents recognize that their most valuable data is at risk, as these four data types could significantly affect the businesses existence if stolen.<strong>\u00a0<\/strong><\/p>\n<p><strong>Challenges within Organizations<\/strong><\/p>\n<p>The following represent challenges within organizations that add additional risk. Respondents reported that they don\u2019t believe their business is sufficient in these areas.<\/p>\n<table>\n<tbody readability=\"5\">\n<tr readability=\"10\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>My organization\u2019s IT security function is involved in determining the acceptable use of disruptive technologies (such as mobile, cloud, social media, IoT devices) in the workplace.<\/li>\n<li>My organization\u2019s IT security function is able to detect zero-day attacks.<\/li>\n<li>My organization is well prepared to deal with data breaches and cybersecurity exploits.<\/li>\n<li>My organization\u2019s IT security architecture has high interoperability, scalability and agility.<\/li>\n<li>My organization\u2019s IT security function conducts assessments and\/or audits to identify threats, vulnerabilities and attacks.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>When you look at these top risks, many appear to show a lack of confidence in the organization\u2019s security controls to detect and block attackers as well as challenges dealing with new technologies being introduces and a security architecture that isn\u2019t well coordinated.<strong>\u00a0<\/strong><\/p>\n<p><strong>Top Threats<\/strong><\/p>\n<p>When we asked what the top threats against them we see the top two targeting their employees:<\/p>\n<table>\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Phishing &amp; social engineering<\/li>\n<li>Clickjacking<\/li>\n<li>Ransomware<\/li>\n<li>Botnets<\/li>\n<li>SQL &amp; code injection<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>There are many more results we can share and I\u2019ll do so in further blogs to help you better understand all of the insights we\u2019ve obtained from this project. We also look forward to seeing the next round to see if organizations feel they\u2019ve improved their capabilities or if they think the threats targeting them have gotten easier or harder to defend against. I\u2019ll leave you with a few of the ways we think organizations can improve their capabilities in protecting against these threats:<\/p>\n<table>\n<tbody readability=\"5\">\n<tr readability=\"10\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Identifying critical data and building security around this data, taking a risk management approach<\/li>\n<li>Minimizing the complexity of infrastructure and improving alignment across the security stack<\/li>\n<li>Improving the ability to protect mobile devices, information and operational technology devices, and cloud infrastructure<\/li>\n<li>Investing in new talent and existing personnel<\/li>\n<li>Reviewing existing security solutions with the latest technologies to detect advanced threats like ransomware and botnets.<\/li>\n<li>Improving IT security architecture with high interoperability, scalability, and agility<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Check out more details of the Cyber Risk Index as well as taking a shortened version of the survey yourself to see how you stack up against your peers on our <a href=\"http:\/\/www.trendmicro.com\/cyberrisk\">CRI webpage<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/cyber-risk-index-a-guide-for-cisos-and-it-security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro has partnered with the Ponemon Institute to develop a new Cyber Risk Index (CRI), which is intended to help CISOs and their IT Security teams better understand the current cyber risk compared to similar businesses of their size and industry. The CRI is based on a survey conducted by Ponemon to more than&#8230;<br \/>\nThe post Cyber Risk Index \u2013 A Guide for CISOs and IT Security appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25182,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[375,5804,5805,5803,5806,188,307],"class_list":["post-25181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-business","tag-clickjacking","tag-cyber-risk-index","tag-cyber-risk-index-cri","tag-enterprise-businesses","tag-phishing","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-12T13:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Risk Index \u2013 A Guide for CISOs and IT Security\",\"datePublished\":\"2019-02-12T13:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg\",\"keywords\":[\"Business\",\"Clickjacking\",\"Cyber Risk Index\",\"Cyber Risk Index (CRI)\",\"enterprise businesses\",\"Phishing\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/\",\"name\":\"Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg\",\"datePublished\":\"2019-02-12T13:00:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg\",\"width\":300,\"height\":178},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-a-guide-for-cisos-and-it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/business\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Risk Index \u2013 A Guide for CISOs and IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-12T13:00:19+00:00","og_image":[{"width":300,"height":178,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security","datePublished":"2019-02-12T13:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/"},"wordCount":762,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg","keywords":["Business","Clickjacking","Cyber Risk Index","Cyber Risk Index (CRI)","enterprise businesses","Phishing","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/","name":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg","datePublished":"2019-02-12T13:00:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/cyber-risk-index-a-guide-for-cisos-and-it-security.jpg","width":300,"height":178},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-a-guide-for-cisos-and-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.threatshub.org\/blog\/tag\/business\/"},{"@type":"ListItem","position":3,"name":"Cyber Risk Index \u2013 A Guide for CISOs and IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25181"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25181\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25182"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}