TIGIR Story_org

TIGIR's Origin: The Research Philosophy

TIGIR was born after 15 years of doing the same thing over and over and getting the same deficient results: breaches. But we continued to perform Threat Risk Assessments (TRAs) the ‘old way’ and to then purchase every kind of technological countermeasure made to plug the holes and fill the gaps. There had to be a better way.

There wasn't much out there and most practitioners didn't acknowledge that were was much of a problem. So I began to write methods to meet the needs of the current threat climate and after a few years, had written the TIGIR methodology.

Then I functionalized it and designed the TIGIR solution, and wrote a very comprehensive algorithm that could calculate all kinds of risk based on real business and markets costs, and began pilot testing.


Now we are here. Trying get the word out and solve a big problem with a solution that relies
 on logic and consistent assessment.

Security, especially cyber security, has been in a prolonged transition stage. For decades we have been using the same threat risk methodologies and the same means to calculate impacts and costs associated with the loss, disruption, damage and sabotage to IT systems as well as others. With cyber in particular we have seen threats not only evolve in their technological sophistication but also in their asymmetry, where they now leverage various domains - social engineering for information, physical security, access credentials, data manipulation - along with technology to meet their agenda.

Currently, much of the data gathering from security breaches stops short of analysis, little intelligence is collected, even less is shared and most countermeasures rely heavily on technological solutions and specialized resources and contractors. If we look back to the advent of web development in the mid-1990s, which was driven by developers and the IT industry, security is very much at the same stage. It didn't take long to recognize that in order for the capabilities of the web to meet business and service needs the application layer had to evolve - functions and interfaces required human behaviour and business analysis to improve usability, thereby enhancing market value, revenues and ROI.

Then the flat one-to-one functions of Web 1.0 led to Web 2.0 with its meta-data, folksonomy, personalization, social interaction and collaboration and web media. As Web 3.0 continues to evolve, computational behaviours emerge, such as machine-to-machine learning, anticipatory intelligence, enhanced data-to-data context - replacing document to document relationships - and of course the Internet of Things.

While all of this affects cyber security, it also is about to experience a similar transformation, especially in the area of threat risk assessment in two of its most untapped offerings: analysis and intelligence.The importance lay in the detailed and comprehensive analysis of security data for a deeper and broader understanding of the impacts and costs associated asset breaches to the organization. The management of vulnerabilities on an ongoing basis, consideration of countermeasures from all domains as they make up the current state and the ability to modify and adjust as the threat and technological landscape changes are crucial success factors.

That's what TIGIR does for an organization.


TIGIR Makes Cyber Threat-Risk Assessments Simple, Fast, Accurate and Data-Rich

Valarie Findlay