Information security risk has dramatically evolved; however, security strategies that are typically compliance-based and perimeter-oriented have not kept pace. Consequently, sophisticated intruders can bypass perimeter defenses to perpetrate attacks that are highly targeted and difficult to detect. This article discusses an approach to assess the adequacy of a firm’s cybersecurity posture. | Auditing Cybersecurity