CYBERSECURITY
ASSESSMENT
HOW WELL IS YOUR ORGANIZATION SET UP REGARDING CYBERSECURITY?
IDENTIFYING GAPS IS THE FIRST STEP TO IMPROVING Companies that fail at cybersecurity are in the news every day. For example, attackers steal confidential data, cripple your core systems, or encrypt your data to extort money. Regardless of the attackers' motivation or goal, the financial and reputational impact can be immense.
Therefore, the improvement of cybersecurity for your company is essential. You need to know the gaps and the corresponding risks. To mitigate these risks, an appropriate and secure posture is key to improving cybersecurity in any organization.
Necessary steps to improve cybersecurity:
Gain management attention
Conduct cybersecurity assessment
Identify and categorize gaps
Identify and classify corresponding risks
Define countermeasures
Implement countermeasures
Close gaps and minimize risks
With our fully comprehensive and proven assessment, we help you improve your organization's cybersecurity and mitigate risks.
OUR ADDED VALUE
Cybersecurity professionals
Many years working experience in the area of cybersecurity
Relevant certificates:
CISSP (Certified Information Systems Security Professional)
CISA (Certified Information Systems Auditor)
Lead Auditor ISO/IEC 27001:2013
CompTIA Cyber Security Analyst (CySA+)
CompTIA Security+
CompTIA Network+
CompTIA Security Analytics Professional (CSAP)
CEH - Certified Ethical Hacker
ITIL v3 (Information Technology Infrastructure Library)
DoDD 85701 Tier 3 Certified Personnel
Severity of vulnerabilities and availability of exploits (percentage of companies):
26% | 5% | 11% | 58% |
High, exploit is available
High
Medium, exploit is available
Medium
© Positive Technologies
Own representation, according to: https://www.comparitech.com/blog/information- security/cybersecurity-vulnerability-statistics/
THE BENEFITS OF A CYBERSECURITY ASSESSMENT With a cybersecurity assessment, the first step to minimizing risks is done.
CUSTOMERS BENEFIT
External assessment
Document cybersecurity gaps
Transparency of existing vulnerabilities
Categorization of existing gaps
Definition of next steps Increasing cyber resilience
RESULTS OF A CYBER
SECURITY ASSESSMENT
Management report
Executive summary
Detailed information including controls and their test results Countermeasures
OUR CYBERSECURITY PORTFOLIO
The past shows that attackers don't care about the size of an organization. Cybersecurity has a vast range and focuses on many topics. Organizations know cybersecurity is essential, but they don't know what to do and how to start.
Our cybersecurity assessment is the first step to move forward, improve cybersecurity and minimize risks.
OUR APPROACH: | ||||||
Checklist oriented cybersecurity | Configuration evaluation | |||||
assessment | of core IT components | |||||
Preferred onsite for about two | Analysis of documentation | |||||
days: | and processes | |||||
Interviews with the IT | Documentation of all results | |||||
department | Categorization of identified | |||||
Selected interviews with staff | gaps | |||||
not related to IT | Definition of countermeasures | |||||
Local inspection | Presenting the final report | |||||
Technical analysis of core | ||||||
IT components |
ACCESS | SOFTWARE | SECURITY | |
ARCHITECTURE | |||
CONTROL | DEV SECURITY | ||
& DESIGN | |||
HUMANS | NETWORK | CRYPTO- | RISK |
SECURITY | GRAPHY | MANAGEMENT | |
BCM & DR | PHYSICAL | SECURITY | |
SECURITY | OPERATIONS | ||
LEGAL & | |||
COMPLIANCE |
AREAS IN FOCUS DURING A CYBERSECURITY ASSESSMENT:
General IT security and | Local networks (LAN/VLAN) | ||
password management | Wireless networks (WLAN) | ||
Physical security | Printer | ||
IT management and the | Interfacing services | ||
IT department | Mobile devices like smartphone | ||
User management | and tablet | ||
Endpoint clients like laptops, | Employee, co-worker, and staff | ||
PCs | Cloud services | ||
Server | |||
AKKA | |||
Hegelstraße 23 | Alte Messe 6 | cybersecurity@akka.eu | Tel.: +49 7031 686-3000 |
D-39104 Magdeburg | D-04103 Leipzig | contact@akka.eu | www.akka-technologies.com |
Attachments
- Original Link
- Original Document
- Permalink
Disclaimer
AKKA Technologies SE published this content on 18 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 18 January 2022 14:39:00 UTC.