Assess and prioritize vulnerabilities

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected, and regulated business world

Across industries, organizations are engaged in a cyber war against multiple, and sometimes unexpected adversaries, including organized crime rings, nation-states, terrorist groups, online vigilantes and hacktivists. The threats to an organization have become more sophisticated and have widened in scope and scale – and show no signs of stopping.  The reputational and financial stakes for an organization could not be higher. Leading companies are working proactively to identify and mitigate threats, preparing to respond quickly and effectively when an incident occurs, and maximizing their capacity to learn and improve over time.

cyber vulnerabilities threat assessment

To establish and maintain cyber resilience, organizations must monitor their environments to identify and prioritize threats. At Stroz Friedberg, we study cyber criminals, their movements, and their playbooks – and we do it all over the globe. Monitoring criminal activity on the Darknet and following specific threat actors allows us to create profiles of key players and stay apprised of how adversaries are changing techniques and tactics. We use that knowledge and expertise to advise organizations – from CISOs and CSOs to CEOs and members of the board – on the current cybersecurity environment, the major trends shaping that environment’s ongoing evolution, and the state of their cyber capabilities, readiness, and resilience.

Our specialists employ scientific principles and methodologies to assess and prioritize the spectrum of cybersecurity risks and provide a company with a robust strategy. We then use that information to recommend solutions that align with a company’s business objectives, both protecting and propelling the enterprise forward.


Our capabilities include:

  • Incident Response Readiness Assessment
  • Comprehensive Risk Assessment via Interviews and Automated Tools
  • Information Security Risk Assessment
  • Technical Security Risk Assessment
  • Application Security Review
  • Physical Security Risk Assessment
  • Cyber Threat Simulation
  • Threat Intelligence Reporting and Assessment



Commentary, new discoveries, and innovative ideas right to your inbox.

Stroz Friedberg

Sorry! You are using an older browser which is not supported by this website.

Please download one of these free browsers to enjoy all our website has to offer:
Firefox, Chrome or Internet Explorer.