1. ISO/IEC 27005:2022 - Information security, cybersecurity and privacy protection — Guidance on managing information security risks.
Section 8.3.2.2 (Threat identification): This standard emphasizes that threat identification should be comprehensive. It states, "Information about threats can be obtained from many sources... It is important to use a combination of sources of information and to involve people with a variety of backgrounds in the threat identification activity." A brainstorming session with all stakeholders directly implements this principle of involving people with varied backgrounds to achieve a comprehensive result.
2. Peltier, T. R. (2010). Information Security Risk Analysis (3rd ed.). Auerbach Publications.
Chapter 5, "Risk Analysis Methodologies," Section: "Facilitated Risk Analysis Process (FRAP)": This well-regarded methodology is built around a facilitated workshop or brainstorming session with business and IT stakeholders. Peltier notes that this collaborative approach is highly effective because "the people who know the business and the threats to the business are the end users and the system support personnel." This directly supports the idea that involving all stakeholders is superior to a top-down or siloed approach.
3. Whitman, M. E., & Mattord, H. J. (2019). Management of Information Security (6th ed.). Cengage Learning.
Chapter 4, "Risk Management": In the discussion on risk identification, the authors describe various techniques. They highlight the value of bringing together "stakeholders from all departments of the organization" in workshops to "brainstorm and generate a list of threats." This is presented as a key method for ensuring that the risk identification process is thorough and reflects the entire organization, not just the IT or security departments.