{"id":39599,"date":"2021-02-16T19:00:57","date_gmt":"2021-02-16T19:00:57","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92853"},"modified":"2021-02-16T19:00:57","modified_gmt":"2021-02-16T19:00:57","slug":"afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/","title":{"rendered":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/SUR21_Hub2S_Contextual_6167_RGB.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity professionals find themselves in high demand as organizations worldwide continue to grapple with how to secure millions of remote workers. <a href=\"https:\/\/www.linkedin.com\/in\/teambuild3r\/\" target=\"_blank\" rel=\"noopener noreferrer\">James Turner<\/a> is an industry analyst at <a href=\"https:\/\/www.cisolens.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CISO Lens<\/a> and served as an adjudicator from 2017 to 2019 for the Australian government\u2019s cyber war games: <a href=\"https:\/\/cyberwargames.humanservices.gov.au\/about\/#:~:text=Operation%20Tsunami%202019%20is%20an,town%20made%20of%20Lego%C2%AE.\" target=\"_blank\" rel=\"noopener noreferrer\">Operation Tsunami<\/a>. In this episode of <a href=\"https:\/\/www.podcastone.com\/episode\/Evaluating-Individual-and-Organizational-Cyber-Risk-in-a-Pandemic-\" target=\"_blank\" rel=\"noopener noreferrer\">Afternoon Cyber Tea<\/a>, James and I talk about how the COVID-19 pandemic has accelerated the critical need for cooperation across the cybersecurity industry, as well as the need for strengthening communication between governments and private organizations.<\/p>\n<p>Our discussion really examines how the pandemic has pushed organizations toward greater cost efficiencies and a new mainstreaming of cybersecurity\u2014democratizing the language and tools to make it part of everyone\u2019s \u201c9 to 5\u201d experience.<\/p>\n<p>\u201cEveryone has a plan until they get hit in the face,\u201d as James puts it. \u201cRansomware is off the hook\u2014one organization just got hit with a 10 million dollar ransom. That\u2019s more than the average Australian or New Zealand organization spends on security in a year.\u201d<\/p>\n<p>If the old saying that every crisis presents an opportunity holds true, James sees the pandemic as a tremendous catalyst for better information sharing amid budget cuts and a fragmented workforce. \u201cThe security operating centers at large banks are on speed-dial with each other because the attack against Company A hits Company B the next day. No organization, or even an entire country, can do it all by themselves.\u201d<\/p>\n<p>During our talk, we also touch on how the pandemic has pushed security professionals to look at new ways of optimizing delivery, such as utilizing an <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noopener noreferrer\">integrated security solution<\/a> rather than an expensive niche product. \u201cIt\u2019s given businesses a new appreciation for automatic patching,\u201d James recounts. \u201cMy group of CISOs is discussing installing agents on personal devices; the legalities and logistics around that. Budgets are becoming an issue; so, I\u2019m encouraging them to think like startups\u2014get creative.\u201d<\/p>\n<p>James and I also examine how security professionals need to do a better job of evangelizing across the entire IT sector, including developing a ground-level understanding of your own organization\u2019s business units. Cybersecurity will only be truly effective when it\u2019s no longer part of an org chart but simply part of everyone\u2019s job.<\/p>\n<p>To hear my complete conversation with James Turner, <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/evaluating-individual-organizational-cyber-risk-in\/id1484676119?i=1000491214120\" target=\"_blank\" rel=\"noopener noreferrer\">listen to the full episode<\/a>.<\/p>\n<h2>What\u2019s next<\/h2>\n<p>In this ongoing podcast series, I talk with cybersecurity influencers about the evolving threat landscape and explore the promise of systems powered by AI, IoT, and other emerging tech. In every episode, we\u2019ll look at empowering people and organizations to create a more secure, productive digital environment.<\/p>\n<h2>Listen to Afternoon Cyber Tea with Ann Johnson on:<\/h2>\n<ul>\n<li><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/evaluating-individual-organizational-cyber-risk-in\/id1484676119?i=1000491214120\" target=\"_blank\" rel=\"noopener noreferrer\">Apple Podcasts<\/a>: You can also download the episode by clicking the Episode Website link.<\/li>\n<li><a href=\"https:\/\/www.podcastone.com\/episode\/Evaluating-Individual-and-Organizational-Cyber-Risk-in-a-Pandemic-\" target=\"_blank\" rel=\"noopener noreferrer\">Podcast One<\/a>: Includes the option to subscribe, so you\u2019re notified as soon as new episodes are available.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/ciso-cybersecurity-strategy\" target=\"_blank\" rel=\"noopener noreferrer\">CISO Spotlight page<\/a>: Listen alongside our CISO Spotlight episodes, where customers and security experts discuss similar topics such as Zero Trust, compliance, going passwordless, and more.<\/li>\n<\/ul>\n<p>In the meantime, bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity. Or reach out to me on <a href=\"https:\/\/www.linkedin.com\/in\/ann-johnsons\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> or <a href=\"https:\/\/twitter.com\/ajohnsocyber\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> if you have guest or topic suggestions.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/16\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pandemic is exposing weaknesses in cybersecurity\u2014learn why an integrated security solution can help combat emerging cyber threats.<br \/>\nThe post Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39600,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[7835,6579,347,34,6681],"class_list":["post-39599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ciso","tag-ciso-series-page","tag-cybersecurity","tag-podcasts","tag-security-strategies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-16T19:00:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic\",\"datePublished\":\"2021-02-16T19:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg\",\"keywords\":[\"CISO\",\"Ciso series page\",\"Cybersecurity\",\"Podcasts\",\"Security strategies\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/\",\"name\":\"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg\",\"datePublished\":\"2021-02-16T19:00:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/ciso\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/","og_locale":"en_US","og_type":"article","og_title":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-16T19:00:57+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic","datePublished":"2021-02-16T19:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/"},"wordCount":569,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg","keywords":["CISO","Ciso series page","Cybersecurity","Podcasts","Security strategies"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/","url":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/","name":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg","datePublished":"2021-02-16T19:00:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/afternoon-cyber-tea-evaluating-individual-and-organizational-cyber-risk-in-a-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISO","item":"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/"},{"@type":"ListItem","position":3,"name":"Afternoon Cyber Tea: Evaluating individual and organizational cyber risk in a pandemic"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39599"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39599\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39600"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}