INSTRUCTIONS
Zoom out to see options & shapes to drag into position on the risk matrix.
Change Shapes by selecting all the shapes that you would like to change, then click the top tab “Shape Format”, then select the option “Edit Shape” and select “Change Shape”. Select the shape you would like each threat actor/TTP to show up in. You can select and change multiple shapes at a time.
Descriptions & Instructions are written in the notes below each slide. If you cannot see notes, move your mouse down to the bottom of the PowerPoint window slowly until you see your mouse turn into an up/down arrow then drag up slowly to reveal the notes. Alternatively, select the “View” tab and click on “Notes”.
Fair Use: You have access to these slides as a premium subscriber to Locks & Leaks. They are for your personal, professional, and academic use. You may use them and distribute the outcomes in image form as you see fit, however please do not share the original slides as they were made and are intended for your use only.
Image: If you want to turn a completed slide into an image, you can either take a screenshot (use the snipping tool), or you can copy all content on the slide (CTRL + A, and then once everything is selected, hit CTRL + C). You can paste the image to the same or a new slide. Once you paste, immediately click the small “CTRL” box in the bottom right of the pasted content and select the image icon. You can also hit CTRL and then “A” after you paste to get the same effect. You now have an image that you can manipulate as needed.
Need edits, have suggestions, or want to provide feedback? E-mail: Shawn@PineRisk.com
THREATS
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Threats
To Business Operations
Crime
Industrial Espionage
Nation-State Espionage
Terrorism
Insider Threats
Activism - Protests
Activism - Disruptions
Sabotage
Workplace Violence
Supply Chain Attacks
Arson
Intellectual Property Theft
Kidnapping
Unauthorized Access
Social Engineering
Mail Bomb
Bomb Threat
Unintentional Leak
Intentional Leaks
Vandalism
Petty Theft
Cyber Stalking
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Threats
To Business Operations
Crime
Industrial Espionage
Nation-State Espionage
Terrorism
Insider Threats
Activism - Protests
Activism - Disruptions
Sabotage
Workplace Violence
Supply Chain Attacks
Arson
Intellectual Property Theft
Kidnapping
Unauthorized Access
Social Engineering
Mail Bomb
Bomb Threat
Unintentional Leak
Intentional Leaks
Vandalism
Petty Theft
Cyber Stalking
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Threats
To Business Operations
Crime
Industrial Espionage
Nation-State Espionage
Terrorism
Insider Threats
Activism - Protests
Activism - Disruptions
Sabotage
Workplace Violence
Supply Chain Attacks
Arson
Intellectual Property Theft
Kidnapping
Unauthorized Access
Social Engineering
Mail Bomb
Bomb Threat
Unintentional Leak
Intentional Leaks
Vandalism
Petty Theft
Cyber Stalking
TACTICS, TECHNIQUES, AND PROCEDURES
(TTPS)
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Tactics, Techniques, and Procedures (TTPs)
Used to Target Businesses
Tailgating
Lock Picking
Access Badge Cloning
Dumpster Diving
Impersonation
Eavesdropping
Surveillance
Alarm Bypass
Forced Entry
Social Engineering
Vehicle Ramming
Key Logger
Vandalism
Bribery or Coercion
Tunneling
Petty Theft
RFID Spoofing
Vehicle Theft
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Tactics, Techniques, and Procedures (TTPs)
Used to Target Businesses
Tailgating
Lock Picking
Access Badge Cloning
Dumpster Diving
Impersonation
Eavesdropping
Surveillance
Alarm Bypass
Forced Entry
Social Engineering
Vehicle Ramming
Key Logger
Vandalism
Bribery or Coercion
Tunneling
Petty Theft
RFID Spoofing
Vehicle Theft
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Tactics, Techniques, and Procedures (TTPs)
Used to Target Businesses
Tailgating
Lock Picking
Access Badge Cloning
Dumpster Diving
Impersonation
Eavesdropping
Surveillance
Alarm Bypass
Forced Entry
Social Engineering
Vehicle Ramming
Key Logger
Vandalism
Bribery or Coercion
Tunneling
Petty Theft
RFID Spoofing
Vehicle Theft
Example Completed
Slides
Likelihood
Very Low
Low
Medium
High
Very High
Impact
Very Low
Low
Medium
High
Very High
Tactics, Techniques, and Procedures (TTPs)
Used to Target Businesses
Tailgating
Lock Picking
Access Badge Cloning
Dumpster Diving
Impersonation
Eavesdropping
Surveillance
Alarm Bypass
Forced Entry
Social Engineering
Vehicle Ramming
Key Logger
Vandalism
Bribery or Coercion
Tunneling
Petty Theft
RFID Spoofing
Vehicle Theft