Cyber Risk Assessment
Define the current state and target state of your security maturity, identify risks and gaps.
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Define the current state and target state of your security maturity, identify risks and gaps.
Assess the strengths, weaknesses and opportunities of your current cybersecurity program. With a Unit 42® Cyber Risk Assessment, you will gain a better understanding of the threat landscape and how to reduce the risks to your business.
Work with our experts to assess your current security posture. Identify and prioritize the most critical improvements on which to focus. From full program build-outs to strategic guidance, we help you establish a world-class cybersecurity program.
Develop the foundations for strong cybersecurity, including policies, procedures, standards, workflows, staffing charts and strategic roadmaps to position your security program for success.
Discover and prioritize security risks across your organization, to build a 1-, 3- or 5-year strategic roadmap that guides your security program so you can focus on your business.
Here’s what we deliver
Findings and Recommendations ReportYou will get a report detailing the assessment scope and methodology as well as our findings and strategic recommendations. This report will provide a comprehensive view of your risk and contributing factors across all aspects of your organization.
Executive SummaryWe will deliver a review of engagement scope, methodology, findings and recommendations. Our team can also provide a verbal executive summary briefing, if requested.
Prioritized RecommendationsYou will learn recommended actions to close security gaps and remediate risks. Findings and recommendations will be prioritized based on your organization’s unique risk tolerance, resource availability and desired future state.
Current and Target Security PostureUnit 42 will help you understand your organization’s current risk posture and define an improved future posture based on your goals and priorities, available resources, vertical industry and regulatory landscape.
Best practices to strengthen your security program
Define engagement detailsUnit 42 collaborates with you to identify the appropriate assessment depth, framework and outputs.
Gather organizational contextWe will provide a pre-engagement questionnaire to gain an understanding of organizational processes, tools and capabilities.
Review existing documentationOur team will review your existing documentation to identify gaps in security control design.
Interview key stakeholdersUnit 42 will interview your people to gain additional insight regarding security control deployment and technical capabilities.
Complete technical validationWe conduct focused technical testing to verify information collected during documentation review and stakeholder interviews.
Report findingsYou will receive a detailed report including security risks with recommendations prioritized to guide your efforts.
Documentation:
Download the Cyber Risk Assessment Datasheet (PDF).
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
