CAPTR Reporting
cost benefit
mathematical analysis
safety
web/reverse risk relationships
CAPTR team recommendations
Chief Information Security Officer (CISO)
CISO’s budgetary allocation
Computer resource-ineffective
Confidential attorney–client privileged information
Counter-APT Red Teaming (CAPTR Teaming)
critical initialization perspective
outcome-oriented scoping
strategic cybersecurity
strategic offensive cybersecurity paradigm
survivability
use of critical perspective
worst-case risk assessment
Crypto-wallet application
Crypto-wallet user’s password
Cybersecurity
assessment methodologies
assets
attacks
box
consumers
craft
definition
employers
engineer
forums and websites
implementations
industry
infinite game
innovation and theory
insurance
mitigation
practice
professionals
program
resiliency technologies
resources
risk mitigation
roles and responsibilities
services/products
solutions
strategy
taxonomy
theater
things
Trade Levels
vendors
vulnerabilities
Cybersecurity analyst vs. cybersecurity engineer
Cybersecurity implementation assessment
controlled and realistic environment
defensible configuration
defensible operation
defensible emulation
human operation
measurable results and metrics
performance
evaluation mediums
environment nature
experiment design
lab network with real attackers
lab network with simulated attackers
real network and operators with real attackers
real network and operators with simulated attackers
human actors
human involvement
requirements identification
technologies
Cybersecurity-related risks