(Imagen 4)
In my work for a Bredemarket client I’ve explored taxonomies for digital assets. But I’ve never explored taxonomies for cybersecurity controls as Erich Winkler just did.
In fact, Winkler categorized cybersecurity controls in two ways: the “how” and the “why.”
So naturally I started with the why.
Winkler:
“By understanding the different types of controls, you’ll be able to make more informed decisions about which ones are best suited for specific situations.”
Winkler identified six different “why” control types:
- Preventive.
- Detective.
- Corrective.
- Deterrent.
- Recovery.
- Compensating.
For definitions of these six “why” control types, his three “how” control types, 3000 words worth of pictures, and some examples, read Winkler’s Substack post. And if you’re brave, take the quiz.
Winkler sums everything up as follows:
“By now, you understand that cybersecurity isn’t just about buying the latest tools. It’s about knowing why you use them and how they work together.”
Winkler writes expertly on cybersecurity. But if you can’t get him, and you need someone to work with you to create content for tech marketers, turn to Bredemarket.

