{"id":46237,"date":"2022-04-18T00:00:00","date_gmt":"2022-04-18T00:00:00","guid":{"rendered":"urn:uuid:c7664787-f71a-53fd-2906-2dcf2b8dd10b"},"modified":"2022-04-18T00:00:00","modified_gmt":"2022-04-18T00:00:00","slug":"cyber-risk-index-2h-2021-an-assessment-for-security-leaders","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/","title":{"rendered":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/cyber-risk-index-for-cisos\/img-ciso-rnp-cyber-risk-index-blog.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/cyber-risk-index-for-cisos\/img-ciso-rnp-cyber-risk-index-blog.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Let\u2019s dig into the results a bit further to identify areas of greatest concern across regions.<\/p>\n<p><i>1.&nbsp;Top five security risks<br \/><\/i>With the global Covid-19 pandemic continuing as well as many successful ransomware attacks and breaches occurring, it does appear that many organizations felt some areas of their preparedness may be more of a concern now than in the past. Below are the top five security risks around their infrastructure:<\/p>\n<ol>\n<li>Mobile\/remote employees<\/li>\n<li>Cloud computing infrastructure and providers<\/li>\n<li>Across 3rd party applications<\/li>\n<li>Malicious insiders<\/li>\n<li>Mobile devices such as smart phones<\/li>\n<\/ol>\n<p>The pandemic brought a major shift from working in office to working from home (WFH), and many organizations had to quickly figure out how to secure these employees.&nbsp; As seen above, this is the biggest concern from respondents and will likely continue.&nbsp; Similarly, businesses showed concerns about mobile devices which are being used more by employees to conduct business remotely.&nbsp;<\/p>\n<p>We also saw an acceleration with cloud implementations during the pandemic and as such it\u2019s not surprising this area of the infrastructure is of major concern.&nbsp; Both WFH and cloud implementations also mean a higher reliance on third-party applications being utilized, and respondents recognize this as a threat.&nbsp; Lastly, malicious insiders are a staple in this list and is one of the hardest areas to protect against for organizations.<\/p>\n<p><i>2.&nbsp;Lack of preparation<br \/><\/i>Globally, respondents indicated the lowest number for preparedness out of all 31 questions in this area: <i>My organization\u2019s IT security function supports security in the DevOps environment.<\/i>&nbsp; As more organizations shift left to the cloud in support of rapid code development, it has become an area of real concern for securing this environment within an organization.<\/p>\n<p><i>3.&nbsp;Successful cyberattacks seem imminent<br \/><\/i>When asked about attacks in the past 12 months and future attacks for next year, the results don\u2019t bode well for 2022. Globally, 84% experienced one or more successful attack, and 35% had seven or more successful attacks in the past 12 months. Additionally, 76% say it is somewhat to very likely they will have a successful attack in the next 12 months. Even though this was a 10% drop from the first half, this again appears to indicate organizations know they are not prepared enough to defend against new attacks.&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Top global threats<\/span><\/p>\n<p>The CRI is designed to help organizations understand where their highest risks lie and identify areas where they can improve their preparedness. We cannot change what the attackers will do in the future, but the CTI will continue to help us understand if attackers are being more aggressive. &nbsp;From the 1H\u20192021 to 2H\u20192021, the top threats globally are:<\/p>\n<ol>\n<li>Ransomware<\/li>\n<li>Phishing and social engineering<\/li>\n<li>Denial of service (DoS)<\/li>\n<li>Botnets<\/li>\n<li>Man-in-the-middle attack (MitM)<\/li>\n<\/ol>\n<p>Ransomware was and will continue to be a major concern for everyone, so it is unsurprising this threat landed at number one.&nbsp; Phishing and social engineering is used in most attacks, mainly for the initial access into a network.&nbsp; One interesting threat is DoS, as we\u2019re seeing some <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/21\/k\/ransomware-as-a-service-101.html\">ransomware-as-a-service<\/a>&nbsp;groups employ this in a multiple extortion attack.&nbsp; MitM attacks may be rising due to the perception that supply chain attacks (a form of MitM) are increasing.<\/p>\n<p><span class=\"body-subhead-title\">Improving your cyber risk<\/span><\/p>\n<p>The good news from the 2H\u20192021 CRI is that we are seeing organizations starting to understand that they need to improve their cyber risk, which is done through a process of improving their people, process, and technology (PPT) within their business. Since the CRI looks at all three of these areas, an improvement to the total CRI could be due to any one, or all, of these categories.&nbsp;<\/p>\n<p>Based on the results, these are the areas of preparedness that need the most work to address the perceived areas of highest risk:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">My organization\u2019s IT security function supports security in the DevOps environment.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization\u2019s IT security leader (CISO) has sufficient authority and resources to achieve a strong security posture.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization\u2019s IT security function strictly enforces acts of non-compliance to security policies, standard operating procedures, and external requirements.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization\u2019s IT security function can know the physical location of business-critical data assets and applications.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization\u2019s IT security leader reports to senior leadership (such as the CEO, COO, or CIO).<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization makes appropriate investments in leading-edged security technologies such as machine learning, automation, orchestration, analytics and\/or artificial intelligence tools.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">My organization spends considerable resources evaluating third-party security risks (including the cloud and the entire supply chain).<\/span><\/li>\n<\/ul>\n<p>In order to address these concerns, CISOs and security leaders should look for a unified cybersecurity platform instead of investing in several disconnected point products across the enterprise. As we stated, the growing attack surface due to remote workers (more devices) as well as evolving threats means organizations need total visibility to better understand, communicate, and mitigate threats. This necessary visibility cannot come from disperse products, but rather a cybersecurity platform which correlates and consolidates deep threat data across the digital attack surface.<\/p>\n<p>Consider a platform backed by continuous threat monitoring, risk insights, extended detection and response (XDR) and supports best approaches like Zero Trust. Broad integrations with third-party services like firewalls, SIEM, SOAR, etc., are equally important. All these features and capabilities will help reduce complexity for security teams, allowing them to investigate only the most critical threats. In turn, an organization\u2019s cyber risk is reduced, enabling business innovation.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>The CRI is ongoing, and we update it each year to show trends around organizations\u2019 ability to prepare and withstand attacks.<\/p>\n<p>Check the webpage for more details and assets and try our CRI calculator to assess your own organization\u2019s CRI against the current results: <a href=\"https:\/\/www.trendmicro.com\/en_us\/security-intelligence\/breaking-news\/cyber-risk-index.html\">www.trendmicro.com\/cyberrisk<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/d\/cyber-risk-index-2H-2021-security-assessment.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We take a look at our latest Cyber Risk Index (CRI) findings across North America, Europe, Asia-Pacific, and Latin\/South America, to help security leaders better understand, communicate, and address their enterprise\u2019s cyber risk. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46238,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9527,9545,9529],"class_list":["post-46237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-report","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/cyber-risk-index-for-cisos\/img-ciso-rnp-cyber-risk-index-blog.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders\",\"datePublished\":\"2022-04-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/\"},\"wordCount\":965,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png\",\"keywords\":[\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Report\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/\",\"name\":\"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png\",\"datePublished\":\"2022-04-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Expert Perspective\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-expert-perspective\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-18T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/cyber-risk-index-for-cisos\/img-ciso-rnp-cyber-risk-index-blog.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders","datePublished":"2022-04-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/"},"wordCount":965,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png","keywords":["Trend Micro CISO : Expert Perspective","Trend Micro CISO : Report","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/","name":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png","datePublished":"2022-04-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-risk-index-2h-2021-an-assessment-for-security-leaders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Expert Perspective","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-expert-perspective\/"},{"@type":"ListItem","position":3,"name":"Cyber Risk Index (2H\u2019 2021): An Assessment for Security Leaders"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46237"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46238"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}