Risk-based assessments tailored to your organisation
Our team helps you baseline your cyber security control and capability effectiveness and performance by conducting in-depth assessments.
Assessment procedures can be tailored to our in-house cyber security control and capability assessment model that is mapped against multiple frameworks and industry standards or performed against specific industry best practice frameworks like NIST CSF, ISO 27001/2, Essential 8 and many more.
How it works
Our approach combines top-down and bottom-up assessment techniques to ensure that you get an accurate picture of your cyber security posture and identify the people, process and technology gaps that purely top-down or bottom-up assessments can’t always find.
01
Business Analysis
We start off with understanding your business and IT environment. We learn about your critical assets and your control environment to inform our assessment approach to target our testing approach.
02
Best Practice Framework
Using our in-house proprietary Cyber Security Capabilities and Controls Framework or a specified industry best practice standard or framework, we use both top-down techniques, such as documentation reviews and interviews, as well as bottom-up techniques, like configuration reviews and other technical discovery methods to test capability maturity and control effectiveness.
03
Gap Identification and Remediation
We identify and document capability and control gaps from the expected state and work with organisations to close these gaps.
Key Assessments
Assessing how your organisation’s control environment is performing is crucial to proactively maintaining and improving your security controls.
Key assessments include:
- NIST CSF v1.1 and v2
- ISO 27001/2
- Essential 8