1 of 14

INSTRUCTIONS

Zoom out to see options & shapes to drag into position on the risk matrix.

Change Shapes by selecting all the shapes that you would like to change, then click the top tab “Shape Format”, then select the option “Edit Shape” and select “Change Shape”. Select the shape you would like each threat actor/TTP to show up in. You can select and change multiple shapes at a time.

Descriptions & Instructions are written in the notes below each slide. If you cannot see notes, move your mouse down to the bottom of the PowerPoint window slowly until you see your mouse turn into an up/down arrow then drag up slowly to reveal the notes. Alternatively, select the “View” tab and click on “Notes”.

Fair Use: You have access to these slides as a premium subscriber to Locks & Leaks. They are for your personal, professional, and academic use. You may use them and distribute the outcomes in image form as you see fit, however please do not share the original slides as they were made and are intended for your use only.

Image: If you want to turn a completed slide into an image, you can either take a screenshot (use the snipping tool), or you can copy all content on the slide (CTRL + A, and then once everything is selected, hit CTRL + C). You can paste the image to the same or a new slide. Once you paste, immediately click the small “CTRL” box in the bottom right of the pasted content and select the image icon. You can also hit CTRL and then “A” after you paste to get the same effect. You now have an image that you can manipulate as needed.

Need edits, have suggestions, or want to provide feedback? E-mail: Shawn@PineRisk.com

2 of 14

THREATS

3 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Threats

To Business Operations

Crime

Industrial Espionage

Nation-State Espionage

Terrorism

Insider Threats

Activism - Protests

Activism - Disruptions

Sabotage

Workplace Violence

Supply Chain Attacks

Arson

Intellectual Property Theft

Kidnapping

Unauthorized Access

Social Engineering

Mail Bomb

Bomb Threat

Unintentional Leak

Intentional Leaks

Vandalism

Petty Theft

Cyber Stalking

4 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Threats

To Business Operations

Crime

Industrial Espionage

Nation-State Espionage

Terrorism

Insider Threats

Activism - Protests

Activism - Disruptions

Sabotage

Workplace Violence

Supply Chain Attacks

Arson

Intellectual Property Theft

Kidnapping

Unauthorized Access

Social Engineering

Mail Bomb

Bomb Threat

Unintentional Leak

Intentional Leaks

Vandalism

Petty Theft

Cyber Stalking

5 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Threats

To Business Operations

Crime

Industrial Espionage

Nation-State Espionage

Terrorism

Insider Threats

Activism - Protests

Activism - Disruptions

Sabotage

Workplace Violence

Supply Chain Attacks

Arson

Intellectual Property Theft

Kidnapping

Unauthorized Access

Social Engineering

Mail Bomb

Bomb Threat

Unintentional Leak

Intentional Leaks

Vandalism

Petty Theft

Cyber Stalking

6 of 14

TACTICS, TECHNIQUES, AND PROCEDURES

(TTPS)

7 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Tactics, Techniques, and Procedures (TTPs)

Used to Target Businesses

Tailgating

Lock Picking

Access Badge Cloning

Dumpster Diving

Impersonation

Eavesdropping

Surveillance

Alarm Bypass

Forced Entry

Social Engineering

Vehicle Ramming

Key Logger

Vandalism

Bribery or Coercion

Tunneling

Petty Theft

RFID Spoofing

Vehicle Theft

8 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Tactics, Techniques, and Procedures (TTPs)

Used to Target Businesses

Tailgating

Lock Picking

Access Badge Cloning

Dumpster Diving

Impersonation

Eavesdropping

Surveillance

Alarm Bypass

Forced Entry

Social Engineering

Vehicle Ramming

Key Logger

Vandalism

Bribery or Coercion

Tunneling

Petty Theft

RFID Spoofing

Vehicle Theft

9 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Tactics, Techniques, and Procedures (TTPs)

Used to Target Businesses

Tailgating

Lock Picking

Access Badge Cloning

Dumpster Diving

Impersonation

Eavesdropping

Surveillance

Alarm Bypass

Forced Entry

Social Engineering

Vehicle Ramming

Key Logger

Vandalism

Bribery or Coercion

Tunneling

Petty Theft

RFID Spoofing

Vehicle Theft

10 of 14

Example Completed

Slides

11 of 14

Likelihood

Very Low

Low

Medium

High

Very High

Impact

Very Low

Low

Medium

High

Very High

Tactics, Techniques, and Procedures (TTPs)

Used to Target Businesses

Tailgating

Lock Picking

Access Badge Cloning

Dumpster Diving

Impersonation

Eavesdropping

Surveillance

Alarm Bypass

Forced Entry

Social Engineering

Vehicle Ramming

Key Logger

Vandalism

Bribery or Coercion

Tunneling

Petty Theft

RFID Spoofing

Vehicle Theft

12 of 14

13 of 14

14 of 14