Skip to content

Configuring Your Threat Profile

Configuring your Threat Profile determines which Adversarial Key Risks (AKRs) are injected into your risk register. AKRs are output by threat intelligence monitoring and reflect the techniques, tactics, and procedures that require mitigation based on your organization’s threat surface.

Click the Edit button in the top right of the Threat Profile page. This unlocks the threat objective sliders so you can adjust scoring.

Use the sliders to set the likelihood and impact for each of the six threat objectives. As you adjust them:

  • The summary paragraphs on the right update to describe the profile that matches your current settings.
  • Experiment with different combinations to find the settings that best reflect your organization’s business model and threat surface.

The six threat objectives consolidate the threat landscape into core categories. For definitions of each, see Threat Objectives.

Before saving, use the What-if Report to preview the AKRs that will be injected into your risk register based on the current slider settings.

  • Click Show more to see the full list of AKRs.
  • Each AKR reflects TTPs (techniques, tactics, and procedures) that require mitigation given the selected threat profile.
  • Use this preview to validate that your slider settings produce the risk coverage you expect.

Once you are satisfied with the configuration:

  1. Save the Threat Profile.
  2. Approve the saved profile.

These two steps can be assigned to separate roles — for example, one person configures and saves while another reviews and approves.

When a Threat Profile is saved and approved, the risk register is updated:

  • AKRs correlated with your threat objectives are injected into (or removed from) the register.
  • The urgency of each AKR adjusts dynamically based on how strongly it correlates with your scored objectives.
  • AKR urgency can change over time as threat intelligence evolves and your profile is updated.

To understand how these risks appear visually, see Threat Profile for heat map interpretation.