Winterstetter, MatthiasRoßnagel, HeikoSchunck, Christian H.Sousa, Filipe2024-06-072024-06-072024978-3-88579-744-9https://dl.gi.de/handle/20.500.12116/44097Prioritization of threats is an important skill for experts working in the cybersecurity field. With daily new discovered threats and a variety of tools providing information, warnings, and alerts, it is essential for experts working in cybersecurity to identify the most important warnings and threats and handle them efficiently to stay ahead of the growing competence, organization, and size of threat groups. To assist cybersecurity experts with these tasks, this paper provides an approach covering six steps that can be used to determine the efficiency of mitigations for a system under consideration. To this end, this paper describes a straightforward approach and provides an example in which it has already been used.enCybersecurityIT-SecurityMitigationsThreat ActorsThreat GroupsMitigation Efficiency.Determining the Efficiency of Mitigations Based on Covered ThreatsText/Conference Paper10.18420/OID2024_171617-5468