Learning Objectives
By the end of this lesson, you will be able to:
- Conduct systematic cybersecurity risk assessments using startup-appropriate methodologies
- Implement practical risk analysis tools and techniques that scale with your resources
- Prioritize risks effectively based on business impact, likelihood, and treatment costs
- Create actionable risk treatment plans with clear recommendations and timelines
- Build repeatable risk assessment processes that improve over time
Introduction: Beyond Gut Feelings
Most startups make cybersecurity decisions based on gut feelings, horror stories from other companies, or whatever the loudest voice in the room thinks is important. While intuition has value, it’s not enough when you’re making decisions that could affect your business survival.
Systematic risk assessment doesn’t require expensive consultants or months of analysis. It means using structured approaches to understand what could go wrong, how likely it is, what the impact would be, and what you can do about it. Done right, risk assessment becomes a competitive advantage—helping you invest security resources where they’ll have the most impact.
This lesson shows you practical, startup-friendly approaches to cybersecurity risk assessment that provide real insights without analysis paralysis.
Understanding ID.RA: Risk Assessment
NIST CSF 2.0 ID.RA Outcomes
ID.RA-01: Asset vulnerabilities are identified and documented
ID.RA-02: Cyber threat intelligence is received from information sharing forums and sources
ID.RA-03: Threats, both internal and external, are identified and documented
ID.RA-04: Potential business impacts and likelihoods are identified
ID.RA-05: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
ID.RA-06: Risk responses are identified and prioritized
Startup Risk Assessment Philosophy
Practical Over Perfect:
- Focus on risks you can actually do something about
- Use simple, understandable assessment methods
- Prioritize action over documentation
- Accept some uncertainty to maintain speed
Business-Focused:
- Assess risks in terms of business impact
- Consider opportunity costs of security investments
- Align risk assessment with business planning cycles
- Communicate risks in business language
Iterative Over Comprehensive:
- Start with high-level assessment, add detail over time
- Regular reassessment as business and threats evolve
- Learn from experience and refine methodology
- Build assessment capability gradually
Actionable Over Academic:
- Every risk assessment should lead to clear actions
- Balance thoroughness with decision-making speed
- Focus on risks that are material to your business
- Use assessment results to justify security investments
Asset-Based Vulnerability Assessment
Vulnerability Identification Framework
Technical Vulnerabilities:
- Software vulnerabilities and missing patches
- Configuration weaknesses and default settings
- Architecture vulnerabilities and design flaws
- Network security gaps and access controls
Process Vulnerabilities:
- Inadequate security procedures and controls
- Insufficient training and awareness programs
- Weak change management and deployment processes
- Poor incident response and recovery capabilities
People Vulnerabilities:
- Social engineering susceptibility
- Insider threat risks and access controls
- Security skills gaps and knowledge deficiencies
- Cultural factors and security motivation
Physical Vulnerabilities:
- Facility security and access controls
- Device security and mobile device management
- Environmental risks and business continuity
- Supply chain and vendor dependencies
Vulnerability Assessment Methods
Automated Vulnerability Scanning:
Infrastructure Scanning:
- Network vulnerability scanners (Nessus, OpenVAS, Qualys)
- Cloud security posture management (CSPM) tools
- Container and Kubernetes security scanners
- Web application security scanners (OWASP ZAP, Burp Suite)
Code and Application Scanning:
- Static Application Security Testing (SAST) tools
- Dynamic Application Security Testing (DAST) tools
- Software Composition Analysis (SCA) for dependencies
- Infrastructure as Code (IaC) security scanning
Configuration Assessment:
- CIS Benchmarks and security configuration guides
- Cloud provider security best practices
- Database and application security hardening guides
- Network device security configuration reviews
Manual Assessment Techniques:
Architecture Review:
## Security Architecture Assessment Checklist
### Network Security
- [ ] Are networks properly segmented and isolated?
- [ ] Are firewall rules documented and regularly reviewed?
- [ ] Is network traffic monitored and logged?
- [ ] Are VPN connections secure and properly configured?
### Access Controls
- [ ] Is multi-factor authentication implemented?
- [ ] Are user access rights regularly reviewed?
- [ ] Are privileged accounts properly managed?
- [ ] Is the principle of least privilege followed?
### Data Protection
- [ ] Is sensitive data classified and inventoried?
- [ ] Is data encrypted at rest and in transit?
- [ ] Are data backup and recovery procedures tested?
- [ ] Are data retention and disposal policies implemented?
### Application Security
- [ ] Are secure development practices followed?
- [ ] Is input validation and output encoding implemented?
- [ ] Are authentication and session management secure?
- [ ] Are security testing and code reviews conducted?
Process Assessment:
- Security policy and procedure reviews
- Employee security awareness and training evaluation
- Incident response and business continuity testing
- Vendor management and third-party risk assessment
Physical Security Assessment:
- Facility access controls and monitoring
- Device security and asset management
- Environmental controls and business continuity
- Remote work and distributed team security
Vulnerability Prioritization Framework
Technical Severity Scoring:
- Critical: Remote code execution, complete system compromise
- High: Significant access or data exposure, privilege escalation
- Medium: Information disclosure, denial of service
- Low: Limited impact, requires local access
Business Impact Assessment:
- Asset Criticality: How important is the affected asset?
- Data Sensitivity: What type of data could be compromised?
- Business Process Impact: How would exploitation affect operations?
- Compliance Implications: Are there regulatory consequences?
Exploitability Factors:
- Attack Complexity: How difficult is exploitation?
- Required Privileges: What access does attacker need?
- User Interaction: Does exploitation require user action?
- Network Access: Can vulnerability be exploited remotely?
Vulnerability Risk Score:
Risk Score = (Technical Severity × Business Impact × Exploitability) / (Mitigation Difficulty × Cost)
Where each factor is scored 1-5 and the result determines prioritization:
- 15-25: Critical priority (immediate action)
- 10-14: High priority (within 30 days)
- 5-9: Medium priority (within 90 days)
- 1-4: Low priority (next maintenance window)
Threat Intelligence and Analysis
Startup-Appropriate Threat Intelligence
Free and Low-Cost Sources:
- Government: CISA alerts, FBI cyber notifications, NIST guidance
- Industry: Industry association reports, ISAC (Information Sharing and Analysis Center) feeds
- Commercial: Free threat intelligence from security vendors
- Open Source: MITRE ATT&CK framework, threat research blogs, academic papers
Intelligence Collection Process:
- Source Identification: Identify relevant and reliable threat intelligence sources
- Automated Collection: Set up feeds and alerts for timely intelligence delivery
- Filtering and Triage: Focus on threats relevant to your industry and technology stack
- Analysis and Contextualization: Understand how threats apply to your specific environment
- Dissemination and Action: Share actionable intelligence with relevant teams
Threat Intelligence Categories:
Strategic Intelligence:
- Industry threat trends and long-term patterns
- Threat actor motivation and capability evolution
- Geopolitical factors affecting cyber threats
- Regulatory and compliance threat landscape
Tactical Intelligence:
- Specific attack techniques and procedures
- Indicators of compromise (IoCs) and signatures
- Vulnerability exploitation methods
- Mitigation and defense strategies
Operational Intelligence:
- Active threat campaigns and ongoing attacks
- Immediate threats to your industry or region
- Zero-day vulnerabilities and emergency patches
- Incident response and forensic intelligence
Internal and External Threat Analysis
External Threat Categories:
Cybercriminals:
- Motivation: Financial gain through data theft, ransomware, fraud
- Capabilities: Moderate to high, often using off-the-shelf tools
- Targets: Any organization with valuable data or payment access
- Methods: Phishing, malware, social engineering, opportunistic attacks
Nation-State Actors:
- Motivation: Espionage, intellectual property theft, disruption
- Capabilities: Very high, custom tools and zero-day exploits
- Targets: Strategic industries, government contractors, innovative startups
- Methods: Advanced persistent threats (APTs), supply chain attacks, insider recruitment
Hacktivists:
- Motivation: Ideological, social, or political causes
- Capabilities: Variable, often crowd-sourced and collaborative
- Targets: Organizations representing opposing viewpoints
- Methods: Website defacement, DDoS attacks, data leaks, social media campaigns
Competitors:
- Motivation: Business advantage through intelligence gathering
- Capabilities: Variable, may use contracted services
- Targets: Intellectual property, customer data, strategic plans
- Methods: Social engineering, insider recruitment, legal intelligence gathering
Internal Threat Categories:
Malicious Insiders:
- Characteristics: Employees with authorized access and malicious intent
- Motivations: Financial gain, revenge, ideology, external coercion
- Capabilities: High, knowledge of internal systems and procedures
- Methods: Data theft, sabotage, fraud, system misuse
Negligent Insiders:
- Characteristics: Employees who inadvertently create security risks
- Motivations: Productivity, convenience, lack of awareness
- Capabilities: Moderate, unintentional but potentially high impact
- Methods: Policy violations, unsafe practices, social engineering victimization
Compromised Insiders:
- Characteristics: Legitimate employees whose accounts or devices are compromised
- Motivations: External attacker motivation through compromised access
- Capabilities: High, legitimate access used by external attackers
- Methods: Account takeover, credential theft, persistent access
Threat Modeling for Startups
Simplified Threat Modeling Process:
Step 1: System Decomposition
- Identify key assets, data flows, and trust boundaries
- Document system architecture and components
- Map user roles and access patterns
- Identify external dependencies and interfaces
Step 2: Threat Identification
- Use STRIDE methodology (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)
- Consider OWASP Top 10 and other common vulnerability classes
- Apply threat intelligence relevant to your technology stack
- Include business logic and process-specific threats
Step 3: Threat Assessment
- Evaluate likelihood based on threat actor capabilities and motivations
- Assess impact based on business consequences and asset value
- Consider existing controls and their effectiveness
- Calculate risk scores for prioritization
Step 4: Mitigation Planning
- Identify security controls to address high-priority threats
- Evaluate cost-effectiveness of different mitigation options
- Plan implementation timeline and resource requirements
- Define success criteria and monitoring approaches
Example Threat Model: SaaS Application
## Threat Model: Customer Data Management API
### Assets
- Customer personal information (PII)
- Authentication credentials and session tokens
- Business intelligence and usage analytics
- Application source code and configuration
### Threats and Mitigations
| Threat | STRIDE Category | Impact | Likelihood | Risk Score | Mitigation |
|--------|-----------------|--------|------------|------------|------------|
| SQL Injection | Tampering, Info Disclosure | High | Medium | 12 | Input validation, parameterized queries |
| Account Takeover | Spoofing, Elevation of Privilege | High | High | 15 | MFA, account monitoring, rate limiting |
| API Abuse | Denial of Service | Medium | High | 10 | Rate limiting, authentication, monitoring |
| Data Breach | Information Disclosure | Critical | Low | 12 | Encryption, access controls, monitoring |
Business Impact and Likelihood Assessment
Business Impact Analysis Framework
Impact Categories:
- Financial: Direct costs, lost revenue, regulatory fines
- Operational: Business disruption, productivity loss, recovery costs
- Reputational: Brand damage, customer trust, market position
- Strategic: Competitive advantage, partnership impact, growth delays
- Legal/Regulatory: Compliance violations, legal liability, sanctions
Impact Assessment Scales:
Quantitative Assessment (Preferred when data available):
- Critical: >$1M impact or >7 days disruption
- High: $250K-$1M impact or 2-7 days disruption
- Medium: $50K-$250K impact or 4-48 hours disruption
- Low: <$50K impact or <4 hours disruption
Qualitative Assessment (When quantitative data unavailable):
- Critical: Threat to business survival or regulatory shutdown
- High: Significant impact on business operations or reputation
- Medium: Moderate impact with manageable consequences
- Low: Minor impact with minimal business consequences
Likelihood Assessment Methods
Historical Analysis:
- Industry incident frequency and patterns
- Your organization’s past security incidents
- Threat intelligence on attack trends
- Vulnerability exploitation frequency
Environmental Factors:
- Threat actor activity in your industry
- Your attack surface and exposure level
- Security control effectiveness
- Business environment and profile
Expert Judgment:
- Internal team assessment and experience
- External consultant and advisor input
- Peer organization intelligence sharing
- Industry expert analysis and research
Likelihood Assessment Scale:
- Very High (>75%): Attack expected within 1 year
- High (50-75%): Attack likely within 1-2 years
- Medium (25-50%): Attack possible within 2-3 years
- Low (10-25%): Attack unlikely but possible
- Very Low (<10%): Attack highly unlikely
Risk Calculation and Prioritization
Quantitative Risk Analysis (When Possible):
Annual Loss Expectancy (ALE) = Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)
Example:
- Data breach impact: $500,000 (SLE)
- Probability: 20% per year (ARO = 0.2)
- Annual Loss Expectancy: $500,000 × 0.2 = $100,000
Risk-based investment decision:
- If control costs <$100,000/year, implement
- If control costs >$100,000/year, consider alternatives
Qualitative Risk Matrix:
Impact/Likelihood | Very Low | Low | Medium | High | Very High |
---|---|---|---|---|---|
Critical | Medium | High | High | Critical | Critical |
High | Low | Medium | High | High | Critical |
Medium | Low | Low | Medium | Medium | High |
Low | Very Low | Low | Low | Medium | Medium |
Risk Prioritization Factors:
- Risk Score: Primary ranking based on impact and likelihood
- Treatment Cost: Cost-effectiveness of risk mitigation options
- Regulatory Requirements: Compliance obligations and deadlines
- Business Timeline: Strategic initiatives and business priorities
- Technical Dependencies: Implementation complexity and prerequisites
Risk Response Planning
Risk Treatment Strategy Selection
Risk Avoidance (Eliminate):
- When to Use: Unacceptable risk that can be eliminated through business process changes
- Examples: Stop using vulnerable software, eliminate risky business practices
- Considerations: Impact on business operations and competitive advantage
Risk Mitigation (Reduce):
- When to Use: Risk reduction through security controls and process improvements
- Examples: Implement MFA, deploy monitoring tools, conduct security training
- Considerations: Cost-effectiveness and residual risk levels
Risk Transfer (Share):
- When to Use: Risk sharing through insurance, contracts, or outsourcing
- Examples: Cyber insurance, managed security services, cloud provider responsibilities
- Considerations: Coverage limitations and third-party dependencies
Risk Acceptance (Retain):
- When to Use: Low-impact risks or when mitigation costs exceed benefits
- Examples: Accept minor vulnerabilities, tolerate some operational risk
- Considerations: Explicit approval and periodic review requirements
Risk Treatment Planning Template
## Risk Treatment Plan - [Risk Name]
### Risk Summary
- **Risk ID:** R-001
- **Risk Description:** [Detailed description of the risk]
- **Risk Owner:** [Person responsible for risk management]
- **Risk Score:** [Current risk level and score]
### Business Context
- **Assets Affected:** [Systems, data, processes impacted]
- **Business Impact:** [Financial, operational, reputational consequences]
- **Likelihood Assessment:** [Probability and rationale]
- **Regulatory Implications:** [Compliance requirements and deadlines]
### Treatment Strategy
- **Approach:** [Avoid/Mitigate/Transfer/Accept]
- **Rationale:** [Why this approach was selected]
- **Success Criteria:** [How success will be measured]
- **Residual Risk:** [Expected risk level after treatment]
### Implementation Plan
- **Actions Required:** [Specific steps and deliverables]
- **Timeline:** [Milestones and deadlines]
- **Resources Needed:** [Budget, people, tools]
- **Dependencies:** [Prerequisites and coordination requirements]
### Monitoring and Review
- **Monitoring Approach:** [How progress will be tracked]
- **Review Schedule:** [When treatment effectiveness will be assessed]
- **Escalation Triggers:** [When to escalate issues or changes]
- **Success Metrics:** [KPIs and measurement criteria]
Cost-Benefit Analysis for Risk Treatments
Cost Categories:
- Implementation: Initial setup, configuration, and deployment costs
- Operational: Ongoing maintenance, monitoring, and management costs
- Training: User education and staff training requirements
- Opportunity: Business impact of security restrictions or processes
Benefit Categories:
- Risk Reduction: Decreased likelihood or impact of security incidents
- Compliance: Meeting regulatory requirements and avoiding penalties
- Efficiency: Process improvements and operational benefits
- Competitive: Market advantages from security posture improvements
Cost-Benefit Example:
## Cost-Benefit Analysis: Multi-Factor Authentication Implementation
### Costs (Annual)
- Software licensing: $15,000
- Implementation services: $10,000 (one-time)
- Training and support: $5,000
- Ongoing management: $8,000
- **Total Annual Cost:** $28,000
### Benefits (Annual)
- Account takeover risk reduction: $150,000 (ALE reduction)
- Compliance requirement fulfillment: $25,000 (avoided penalties)
- Customer confidence and sales enablement: $50,000
- **Total Annual Benefit:** $225,000
### Analysis
- **Net Benefit:** $225,000 - $28,000 = $197,000
- **Return on Investment:** 197,000 / 28,000 = 704%
- **Payback Period:** 1.5 months
- **Recommendation:** Implement immediately
Hands-On Exercise: Conduct a Startup Risk Assessment
Step 1: Asset and Vulnerability Identification
Critical Assets (Identify top 5):
- _________________ (Asset type: _______, Business impact: _______)
- _________________ (Asset type: _______, Business impact: _______)
- _________________ (Asset type: _______, Business impact: _______)
- _________________ (Asset type: _______, Business impact: _______)
- _________________ (Asset type: _______, Business impact: _______)
Vulnerability Assessment (For each critical asset):
- Technical vulnerabilities: _________________
- Process vulnerabilities: _________________
- People vulnerabilities: _________________
- Physical vulnerabilities: _________________
Step 2: Threat Analysis
Primary External Threats (Rank by relevance):
- Cybercriminals (financial motivation)
- Nation-state actors (espionage, IP theft)
- Hacktivists (ideological motivation)
- Competitors (business advantage)
- Script kiddies (opportunistic attacks)
Primary Internal Threats:
- Malicious insiders (intentional harm)
- Negligent insiders (accidental harm)
- Compromised insiders (external control)
Threat Intelligence Sources:
- Industry sources: _________________
- Government sources: _________________
- Vendor sources: _________________
- Peer networks: _________________
Step 3: Risk Calculation and Prioritization
Top 10 Risks Assessment:
Risk | Asset | Threat | Vulnerability | Impact (1-5) | Likelihood (1-5) | Risk Score | Priority |
---|---|---|---|---|---|---|---|
1. _____ | _____ | _____ | _____ | _____ | _____ | _____ | _____ |
2. _____ | _____ | _____ | _____ | _____ | _____ | _____ | _____ |
3. _____ | _____ | _____ | _____ | _____ | _____ | _____ | _____ |
4. _____ | _____ | _____ | _____ | _____ | _____ | _____ | _____ |
5. _____ | _____ | _____ | _____ | _____ | _____ | _____ | _____ |
Step 4: Risk Treatment Planning
Top 3 Priority Risks:
Risk 1: _________________
- Treatment Strategy: [Avoid/Mitigate/Transfer/Accept]
- Specific Actions: _________________
- Timeline: _________________
- Budget Required: $_________________
Risk 2: _________________
- Treatment Strategy: [Avoid/Mitigate/Transfer/Accept]
- Specific Actions: _________________
- Timeline: _________________
- Budget Required: $_________________
Risk 3: _________________
- Treatment Strategy: [Avoid/Mitigate/Transfer/Accept]
- Specific Actions: _________________
- Timeline: _________________
- Budget Required: $_________________
Step 5: Implementation Planning
30-Day Actions:
- _________________
- _________________
- _________________
90-Day Goals:
- _________________
- _________________
- _________________
Annual Objectives:
- _________________
- _________________
- _________________
Real-World Example: Fintech Startup Risk Assessment
Company: 30-employee digital lending platform Business Model: B2C personal loans with AI-driven underwriting Technology: Cloud-native architecture on AWS with React frontend
Risk Assessment Process:
Phase 1: Asset and Vulnerability Identification
- Critical Assets: Customer PII, loan underwriting algorithms, payment systems, AWS infrastructure
- Key Vulnerabilities: Web application security, API authentication, third-party integrations, insider access
Phase 2: Threat Analysis
- Primary External Threats: Cybercriminals (loan fraud), competitors (IP theft), regulators (compliance)
- Primary Internal Threats: Negligent employees (data exposure), contractors (access abuse)
- Threat Intelligence: Financial services threat feeds, OCC cybersecurity guidance, FFIEC updates
Phase 3: Risk Assessment Results
Top 5 Risks Identified:
-
Customer Data Breach (Impact: Critical, Likelihood: Medium, Score: 15)
- Potential $2M+ impact including fines, lawsuits, customer loss
- Treatment: Encrypt all PII, implement DLP, enhance monitoring
-
AI Model Manipulation (Impact: High, Likelihood: Low, Score: 8)
- Potential fraud losses and regulatory violations
- Treatment: Model validation, input validation, audit logging
-
Payment System Compromise (Impact: Critical, Likelihood: Low, Score: 12)
- Direct financial loss and regulatory violations
- Treatment: Enhanced payment security, transaction monitoring
-
Third-Party Vendor Breach (Impact: High, Likelihood: Medium, Score: 12)
- Data exposure through vendor compromise
- Treatment: Vendor risk assessment, BAA requirements
-
Insider Fraud (Impact: High, Likelihood: Low, Score: 8)
- Loan manipulation and customer data theft
- Treatment: Access controls, user behavior monitoring
Phase 4: Risk Treatment Implementation
Year 1 Investments ($150,000 budget):
- Data encryption and DLP solution: $45,000
- Enhanced authentication and access controls: $30,000
- Security monitoring and SIEM: $40,000
- Vendor risk management program: $15,000
- Security training and awareness: $10,000
- Incident response preparation: $10,000
Results After 12 Months:
- Risk scores reduced by average of 40%
- Zero reportable security incidents
- Passed state regulatory examination
- Customer trust score improved by 25%
- Enabled expansion to 3 new states
- Security-driven customer acquisition: $800,000 additional loans
ROI Analysis:
- Security investment: $150,000
- Risk reduction value: $500,000+ (avoided incident costs)
- Business enablement: $800,000 (additional revenue)
- Total ROI: 867% in first year
Key Lessons:
- Quantitative risk analysis helped justify security investments
- Business-focused risk communication gained executive support
- Regular reassessment revealed new risks as business evolved
- Integration with business planning improved security resource allocation
Common Risk Assessment Challenges
Challenge: “We Don’t Have Enough Data for Accurate Assessment”
Solution:
- Start with qualitative assessments using expert judgment
- Use industry data and benchmarks as proxies
- Collect data over time to improve assessment accuracy
- Focus on directionally correct rather than precisely accurate
Challenge: “Risk Assessment Takes Too Long”
Solution:
- Use rapid risk assessment techniques for initial evaluation
- Focus on high-impact, high-likelihood risks first
- Leverage automated tools for technical vulnerability assessment
- Build assessment capability gradually over multiple cycles
Challenge: “Business Leaders Don’t Understand Technical Risks”
Solution:
- Translate technical risks into business impact terms
- Use scenarios and examples relevant to your business
- Quantify risks in financial terms when possible
- Focus on actionable recommendations rather than detailed analysis
Challenge: “Risks Change Faster Than We Can Assess Them”
Solution:
- Implement continuous monitoring for key risk indicators
- Use automated tools to identify emerging risks
- Focus on risk categories rather than individual risks
- Build adaptive assessment processes that can evolve quickly
Key Takeaways
- Start Simple, Build Sophistication: Begin with basic risk assessment and add complexity over time
- Focus on Business Impact: Assess and communicate risks in business terms that drive action
- Use Data When Available: Quantitative analysis provides stronger justification for security investments
- Regular Reassessment Essential: Risk landscapes change rapidly, requiring periodic evaluation
- Action-Oriented Outcomes: Every risk assessment should lead to clear, prioritized actions
Knowledge Check
-
What’s the most important factor in startup risk assessment prioritization?
- A) Technical severity scores
- B) Industry best practices
- C) Business impact and likelihood
- D) Compliance requirements
-
How often should startups conduct comprehensive risk assessments?
- A) Monthly
- B) Quarterly
- C) Annually with quarterly updates
- D) Only when problems occur
-
What’s the primary goal of quantitative risk analysis?
- A) Perfect accuracy in risk measurement
- B) Justifying security investments with business cases
- C) Meeting compliance requirements
- D) Impressing external auditors
Additional Resources
- Next Lesson: IDENTIFY - Risk Management Strategy (ID.RM)
- Risk assessment templates and calculators (coming soon)
- Threat modeling guides and examples (coming soon)
- Automated risk assessment tool comparisons (coming soon)
In the next lesson, we’ll explore how to develop a comprehensive risk management strategy that integrates assessment results into ongoing business operations and strategic planning.