Cybersecurity risk register

Play CISO Game free Free demo · no signup · plays in 30–45 min
Start playing →

A CISO's job runs against a register of named, prioritized risks. CISO Game tracks 52 of them live — every product purchase, hire, or event resolution moves their exposure scores in real time.

Why a risk register matters

Every mature security program is anchored to a risk register: a structured list of named threats with severity, likelihood, ownership, and mitigation status. The register is what the CISO carries into the boardroom, what auditors ask for, and what insurance carriers attest against. Without one, security work runs as a backlog of tooling decisions disconnected from the risks they actually address. CISO Game makes this connection visible — every investment links to the specific risks it mitigates, and every event in the simulation traces back to a risk that was inadequately covered.

How CISO Game's risk categories map to real frameworks

The eight categories below align loosely with NIST CSF 2.0 functional areas and MITRE ATT&CK enterprise tactics. External risks (R01–R08) cover adversarial action originating outside the company perimeter — ransomware, phishing, DDoS, supply chain. Identity covers authentication, authorization, and identity-provider concentration. Insider handles malicious or negligent authorized users. Data tracks confidentiality and integrity across all storage. Operational covers IT/OT and physical-cyber convergence. Resilience measures recovery readiness. Governance is the regulatory, audit, and compliance posture. AI is the newest category — only material when AI focus is enabled in the scenario.

What the severity score means

Severity runs 1–10. Catastrophic (9–10) risks like Ransomware (R01) and Supply Chain (R06) are program-ending if they materialize without preparation. Major (7–8) risks materially impact the program but are recoverable. Moderate (5–6) risks are persistent operational concerns. Limited (1–4) risks are background noise that the program should track but rarely act on directly. Severity is one input to exposure — the other is your current posture and which mitigating products you own. How exposure is calculated →

The full register

Click any risk for its mitigation profile, the investments that reduce its exposure, related risks with similar dominant subscores, and the scenarios where it appears prominently.

AI risks 11

Data risks 9

External risks 11

Governance risks 11

Identity risks 1

Insider risks 4

Operational risks 2

Resilience risks 3

Play CISO Game free →