{"version":"1.0","provider_name":"CFA, FRM, and Actuarial Exams Study Notes","provider_url":"https:\/\/analystprep.com\/study-notes","title":"The Cyber-Resilient Organization| AnalystPrep - FRM Part 2 Exam","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qovnmhvYqd\"><a href=\"https:\/\/analystprep.com\/study-notes\/frm\/the-cyber-resilient-organization\/\">The Cyber-Resilient Organization<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/analystprep.com\/study-notes\/frm\/the-cyber-resilient-organization\/embed\/#?secret=qovnmhvYqd\" width=\"600\" height=\"338\" title=\"&#8220;The Cyber-Resilient Organization&#8221; &#8212; CFA, FRM, and Actuarial Exams Study Notes\" data-secret=\"qovnmhvYqd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/analystprep.com\/study-notes\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The cybersecurity evaluation mostly starts with the threat analysis. An organization ought to assess the likelihood of being the main target of each threat group or being entangled in the collateral damage due to the threat group\u2019s activities. The analysis involves monitoring the cyber events (attempted attacks, malware identification, dubious activity), generally termed as an incident log."}