Your Top Five Cyber Risks in Five Clicks with the Free Cyber Risk Analysis

FREE RISK ANALYSIS
Request Demo

The CyberSaint team has been working hard to deliver the latest updates to streamline and improve our customers’ user experience and address their top-of-mind challenges. We’re thrilled to announce the latest additions and updates to the CyberStrong solution, which includes an entirely new navigation experience, a new Home Page, Hierarchical Role-Based Controls, and Custom Risk Types and Categories. Additionally, we’ve redesigned the NIST 800-30 Risk Register. 

The blog below provides more details about the latest updates to CyberStrong and how this can improve your usage of our cyber risk management solution. These updates will be available on December 7, 2025. 

CyberStrong 4.0

New Platform Navigation Experience 

We’ve redesigned and updated the CyberStrong navigation experience to improve the overall experience for our clients.

This redesign includes shifting the navigation menu (Home, Executive Dashboards, Assets, Assessments, etc.) to the left pane, which includes personal and administrative settings. The left navigation pane can be collapsed and expanded to support additional screen real estate.

This update also includes reorganized Administrative Settings to support easier setup and administration.

New CyberStrong Home Page

We have redesigned the Home Page to align with our improvement of overall user experience and accommodate a shift from a compliance-focused Home Page. This redesign includes new dashboard widgets to consolidate data from other parts of the platform, including:

  • Assessments
  • Frameworks
  • Risks
  • Remediation

CyberStrong users can easily access top risk insights on the Home Page for streamlined use.

Hierarchical Role-Based Access Control

Our multi-tenancy capabilities, which leverage Teams, have previously been a bit complex and confusing. In addition, customers have asked for more flexibility in defining custom roles to provide access to the platform.

With the latest updates, we have implemented a new hierarchical role-based access control system. This will solve the complexities of multi-tenancy and empower the customers to have more flexibility with custom roles. 

During the migration, the following will be updated:

  1. All asset groups, assessments, risk registers, remediation projects, dashboards, etc. will be mapped to their organizational unit based on the Teams to OU mappings completed before the migration.
  2. All users within teams will be added to groups.
  3. Access will be granted by group, role, and organizational unit.

Note: Teams to organizational unit mappings should have been completed before migration.  Otherwise, all asset groups, assessments, risk registers, remediation projects, dashboards, etc., will be linked to the root organizational unit node.


 

 

CyberStrong Risk Hub

Redesigned NIST 800-30 Risk Register 

Clients were finding it difficult to easily access risk data as the previous risk register was organized as a long list of data. 

With the new update, we’ve split the Overview and Risks into separate tabs in the NIST 800-30 Risk Register. Each risk scenario is broken into three separate tabs as follows:

  • Info - Basic details of the risk
  • Details - Qualitative and quantitative risk details
  • Controls - List of controls associated with risk

Note: These updates only apply to NIST 800-30 risk registers. 











Custom Risk Types and Models 

Prior to this update, the NIST 800-30 risk register supported default risk types and categories, but with a few enhancements, it could also support additional risks. Clients have requested a broader set of capabilities to add additional risk types and categories to the platform.

We have enhanced the NIST 800-30 risk register to support additional risk types and categories. The selected risk type will determine the categories available for that selection. Clients will have new default values for risk types and the corresponding categories. They can also add, delete, and edit additional risk types and categories.  

The new default risk types and categories added include:

1. Compliance

  • Laws
  • Regulations
  • Privacy

2. Cybersecurity

  • Ransomware
  • Malicious insider
  • System Vulnerabilities
  • Denial of Service
  • Social Engineering
  • Compromised/weak credentials
  • Malware
  • Access or Privilege Misuse
  • Misconfiguration
  • Human Error
  • Code Exploitation
  • Physical
  • Third and fourth-party vendors
  • Transmission Interception
  • Missing or poor encryption
  • Session hijacking
  • Brute force
  • Environmental Factors

3. Financial

  • Credit
  • Equity
  • Interest Rate
  • Currency
  • Commodity
  • Inflation
  • Liquidity
  • Model
  • Valuation
  • Country
  • Political

4. Legal

  • Contracts
  • Intellectual Property
  • Employment

5. Operational

  • Business Disruption
  • Business Processes
  • Business Practices
  • Employee Safety
  • Internal Fraud
  • External Fraud

6. Reputational

  • Brand
  • Social Media
  • Quality

7. Strategic

  • Budget
  • Performance
  • Management
  • Business Environment
  • Transaction
  • Investor Relations
  • Human Capital
  • Technological




You may also like

Choosing the Right Cyber Risk ...
on December 27, 2024

Selecting a cyber risk management solution is a critical decision for any organization. The process requires careful consideration of your needs, how a platform can meet them, and ...

How to Streamline Your ...
on December 24, 2024

Many industry regulations require or promote cybersecurity risk assessments to bolster incident response, but what is a cybersecurity risk assessment? For example, cyber risk ...

Alison Furneaux
CISO Reporting Structure ...
on December 23, 2024

The Changing Landscape of CISO Reporting The Chief Information Security Officer (CISO) role has evolved dramatically in recent years. Traditionally reporting to the Chief ...

How to Leverage the FAIR Model ...
on December 19, 2024

In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and ...

Kyndall Elliott
How to Effectively Communicate Top ...
on December 9, 2024

Effective cybersecurity reporting is more important than ever for CISOs, CIOs, and other security leaders in today's complex threat landscape. Reporting isn’t just about sharing ...

November Product Update
on November 27, 2024

The CyberSaint team has been working hard to deliver the latest updates to streamline and improve our customers’ user experience and address their top-of-mind challenges. We’re ...