Earthdrop Shadow
Arrow
403
Threat
Intel
Gallery

We initially built Cascade to save time - time which can be better spent by teams on protecting their organisations.

The risk assessment process is at the heart of so many international standards – covering everything from crisis management, to information security, to continuity – because it works. It works because it creates an engine for firms to monitor their environment, collect intelligence,  and then ask – so what? 

The process works - it's just the tools that don't. That's where Cascade comes in.

  • Collect and manage intelligence with ease.
  • Understand this intelligence with powerful analytics.
  • Identify and assess specific threats, based on your intelligence, in real time.
  • Track and update thousands of assets covering people, process, information and reputation.
  • Carry out criticality and vulnerability assessments to prioritise resources.
  • Connect threats to assets to form dynamic risk relationships.
  • Add risk reduction projects and track their progress.

Add and manage pieces of intelligence and evidence, quickly and collaboratively.

Each piece of intelligence or evidence – such as incident reports, occurrences, human intelligence or open source – can be categorised through completely custom tags (such as ‘incident’, ‘cyber’, or ‘person of interest’) and can be geolocated down to rooftop level using Google’s most recent satellite imagery. Include the tactics associated with the intelligence to inform threats, or upload images or documents. 

Intelligence

Connect intelligence together in ways that make the most sense for you.

Sort intelligence by time, date, the tags associated with them, titles, or make connections between the intelligence and an active threat or current asset. Carry out elastic searching to look for specific keywords of interest, or understand how often a particular threat actor has targeted the organisation. 

Intelligence

Spend more time coming to conclusions through our powerful analytics engine.

Use the custom tags function to create analytical models which can be compared together and graphed over any time period – for example, want to assess how often you’re receiving physical security intelligence? Or compare whether the organisation is experiencing more protests or incidences of social engineering? The engine has you covered: it can also interrogate trends in targeting of specific assets, or understanding which threat actors are most active. This allows senior leaders to more easily justify their strategies, and provides a great foundation for the rest of the risk assessment process.

Compare

Utilise your intelligence to identify, assess and update organisational threats.

Create threat actors with specific geographies, descriptions, and threat tactics and link this to existing intelligence: quickly and easily change and update that threat actor’s intent or capability to provide a new threat rating to inform subsequent risk assessments. 

Threats New

Get a full view of your operating environment.

List and compare your active threats across multiple, or individual, geographies or regions of interest – and help with prioritising intelligence collection or risk treatment by sorting and organising threats by intent, capability or threat rating. 

Threats

Map and update your specific asset locations using our Google Maps API integration.

Utilise the latest satellite imagery, night mapping (great for operations and control rooms) or a hybrid to specifically geolocate assets anywhere in the world using our PostGIS database. 

Map Night Mode

Focus your team on the assets they need to protect.

List and compare all of your key organisational assets that need to be protected, based on the standard person, place, process, information and reputation categories. Include documents relating to that asset, like site-level incident management plans or designs, as well as images. 

Assets

Carry out vulnerability assessments in minutes, not hours.

Develop fully custom vulnerability assessment criteria – per asset type – based on your existing baseline organisational standards for physical security, information security, continuity, crisis communications or reputation. Gain an instant vulnerability assessment percentage when these measures are updated.

Asset Type Vuln

Dynamic risk relationships ensure risks are continuously updated - not just once a year.

Create risks by connecting active threats (e.g., ‘Influenza H1N1 virus’) to key organisational assets (like your CEO): the relationship is dynamic and based on the threat’s intent and capability, as well as the criticality and vulnerability of the asset. The risk rating changes automatically and dynamically as the internal or external situation evolves. 

Add Risk

Use our project progress tools to associate risk reduction programmes with the risks they'll be reducing.

Sort risks by their threat rating, impact rating, overall risk score – or by the asset affected or source threat. Add new risk reduction projects and track their progress within the risk dashboard, or export asset-specific reports into PDFs. 

Projects