APT Avatar Hub

Where Advanced Persistent Threats Meet Their Digital Protectors

Risk Register

Track known risks and their mitigation status. Monitor progress and ensure accountability for security risks.

2
Open Risks
1
Being Mitigated
1
Under Monitoring
1
Closed
Risk IDTitleCategoryLikelihoodImpactRisk LevelStatusOwnerDue Date
R-001Ransomware Attack on Critical SystemsMalwareMediumCriticalHighOpenCISO2025-02-15
R-002Supply Chain CompromiseThird PartyLowHighMediumMitigatingProcurement Lead2025-03-01
R-003Insider Threat from Disgruntled EmployeeInsiderLowHighMediumMonitoringHR Security2025-04-15
R-004Data Breach via PhishingSocial EngineeringHighHighHighOpenIT Security2025-01-30
R-005DDoS Attack on Public ServicesDDoSMediumMediumMediumClosedNetwork Team2025-01-01

Risk Details

R-001

Ransomware Attack on Critical Systems

High
Open

Mitigation Strategy

Enhanced backup strategy, network segmentation

Assignment

Owner: CISO
Due Date: 2025-02-15
Last Updated: 2025-01-10

R-002

Supply Chain Compromise

Medium
Mitigating

Mitigation Strategy

Vendor security assessments, contract clauses

Assignment

Owner: Procurement Lead
Due Date: 2025-03-01
Last Updated: 2025-01-08

R-003

Insider Threat from Disgruntled Employee

Medium
Monitoring

Mitigation Strategy

Access monitoring, employee screening

Assignment

Owner: HR Security
Due Date: 2025-04-15
Last Updated: 2025-01-05

R-004

Data Breach via Phishing

High
Open

Mitigation Strategy

Security awareness training, email filtering

Assignment

Owner: IT Security
Due Date: 2025-01-30
Last Updated: 2025-01-12

R-005

DDoS Attack on Public Services

Medium
Closed

Mitigation Strategy

DDoS protection service implemented

Assignment

Owner: Network Team
Due Date: 2025-01-01
Last Updated: 2025-01-01