Skip to main content
Strategic briefing around a terrain model of the border area between Norway and Russia at Storskog, with military and civilian advisors
I. Strategic cyber security for boards

Cyber attacks are war.
Just invisible.

Strategic cyber advisory for boards. Translated into a language you already speak: terrain, tactics and decisions. From expert jargon to concrete choices.

I. The challenge

The board lacks a language
for cyber.

Cyber is among the biggest risk areas a board is responsible for. The fourth domain, alongside sea, land and air.

Yet it's described in a language that makes it hard to make good decisions.

Not because it's unimportant. Because it hasn't been translated.

The Nexxera Method: cyber kill chain synthesized with the OODA loop and military F2T2EA doctrine

Built on the Cyber Kill Chain (Lockheed Martin), the OODA loop (John Boyd) and F2T2EA (Find, Fix, Track, Target, Engage, Assess).

II. The method

We translate cyber into operational language.

The principles are the same. The domain is new.

We use maps, terrain and scenarios. That turns threats into something you can see, discuss and decide on. The terrain is made up of perimeter, networks, applications, hardware and databases, placed in zones according to how much control you have over them.

The transformation
Transformation from ISO 27001 checklist to operational terrain map with named assets and an attack path

The same information. A different language.

01

Tracks the threat

Checklists are static and frozen in a single version. A terrain map updates the same day the threat picture shifts. You get a defence that follows reality.

02

Shared language

Boards read maps faster than reports. When everyone sees the same picture, the discussion shifts from terminology to priorities. Expert vocabulary stays with the experts.

03

Builds on NIST

We don't replace ISO 27001 or NIST. The map sits on top of them and translates what you're already obligated to do into something the board can actually decide on.

III. How it works

One workshop. One scenario.

You leave with a terrain map of your digital business, a threat simulation run on your map, a defence plan with scored measures and a decision document for the board minutes.

Summary of the workshop: approach, play rules, benefits and outcomes.
The four phases of a workshop
  1. 01

    Orientation

    We draw the business's digital terrain. What you have, where it sits, and who controls each part.

  2. 02

    Assessment

    We place the threat actors on the map. APTs, criminals, insiders and hacktivists have different motives and different routes in. We play through known attacks on your terrain.

  3. 03

    Defence

    We draw in the effects. What gets secured, what gets trained, what gets monitored, what gets controlled. Each effect is matched with concrete measures across technology, process or people.

  4. 04

    Play

    We test the plan against the threat. The board makes decisions in real time and scores the plan against five questions. The winning plan gets adopted.

IV. Board scrutiny

Five questions your board should ask before approving a plan.

  1. Is it feasible?
  2. What can we accept?
  3. Do we see the whole picture?
  4. Have we thought smart enough?
  5. Is the plan suitable?

Each question opens up themes like ROI, residual risk, the RACI matrix, alternative approaches and future-proofing.

V. Booking

Book a strategic call.

30 minutes. No obligations. We talk about how you work with cyber today, and whether this adds value for you.