CYBERSECURITY

ASSESSMENT

HOW WELL IS YOUR ORGANIZATION SET UP REGARDING CYBERSECURITY?

IDENTIFYING GAPS IS THE FIRST STEP TO IMPROVING Companies that fail at cybersecurity are in the news every day. For example, attackers steal confidential data, cripple your core systems, or encrypt your data to extort money. Regardless of the attackers' motivation or goal, the financial and reputational impact can be immense.

Therefore, the improvement of cybersecurity for your company is essential. You need to know the gaps and the corresponding risks. To mitigate these risks, an appropriate and secure posture is key to improving cybersecurity in any organization.

Necessary steps to improve cybersecurity:

Gain management attention

Conduct cybersecurity assessment

Identify and categorize gaps

Identify and classify corresponding risks

Define countermeasures

Implement countermeasures

Close gaps and minimize risks

With our fully comprehensive and proven assessment, we help you improve your organization's cybersecurity and mitigate risks.

OUR ADDED VALUE

Cybersecurity professionals

Many years working experience in the area of cybersecurity

Relevant certificates:

CISSP (Certified Information Systems Security Professional)

CISA (Certified Information Systems Auditor)

Lead Auditor ISO/IEC 27001:2013

CompTIA Cyber Security Analyst (CySA+)

CompTIA Security+

CompTIA Network+

CompTIA Security Analytics Professional (CSAP)

CEH - Certified Ethical Hacker

ITIL v3 (Information Technology Infrastructure Library)

DoDD 85701 Tier 3 Certified Personnel

Severity of vulnerabilities and availability of exploits (percentage of companies):

26%

5%

11%

58%

High, exploit is available

High

Medium, exploit is available

Medium

© Positive Technologies

Own representation, according to: https://www.comparitech.com/blog/information- security/cybersecurity-vulnerability-statistics/

THE BENEFITS OF A CYBERSECURITY ASSESSMENT With a cybersecurity assessment, the first step to minimizing risks is done.

CUSTOMERS BENEFIT

External assessment

Document cybersecurity gaps

Transparency of existing vulnerabilities

Categorization of existing gaps

Definition of next steps Increasing cyber resilience

RESULTS OF A CYBER­

SECURITY ASSESSMENT

Management report

Executive summary

Detailed information including controls and their test results Countermeasures

OUR CYBERSECURITY PORTFOLIO

The past shows that attackers don't care about the size of an organization. Cybersecurity has a vast range and focuses on many topics. Organizations know cybersecurity is essential, but they don't know what to do and how to start.

Our cybersecurity assessment is the first step to move forward, improve cybersecurity and minimize risks.

OUR APPROACH:

Checklist oriented cybersecurity

Configuration evaluation

assessment

of core IT components

Preferred onsite for about two

Analysis of documentation

days:

and processes

Interviews with the IT

Documentation of all results

department

Categorization of identified

Selected interviews with staff

gaps

not related to IT

Definition of countermeasures

Local inspection

Presenting the final report

Technical analysis of core

IT components

ACCESS

SOFTWARE

SECURITY

ARCHITECTURE

CONTROL

DEV SECURITY

& DESIGN

HUMANS

NETWORK

CRYPTO-

RISK

SECURITY

GRAPHY

MANAGEMENT

BCM & DR

PHYSICAL

SECURITY

SECURITY

OPERATIONS

LEGAL &

COMPLIANCE

AREAS IN FOCUS DURING A CYBERSECURITY ASSESSMENT:

General IT security and

Local networks (LAN/VLAN)

password management

Wireless networks (WLAN)

Physical security

Printer

IT management and the

Interfacing services

IT department

Mobile devices like smartphone

User management

and tablet

Endpoint clients like laptops,

Employee, co-worker, and staff

PCs

Cloud services

Server

AKKA

Hegelstraße 23

Alte Messe 6

cybersecurity@akka.eu

Tel.: +49 7031 686-3000

D-39104 Magdeburg

D-04103 Leipzig

contact@akka.eu

www.akka-technologies.com

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

AKKA Technologies SE published this content on 18 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 18 January 2022 14:39:00 UTC.