Cyber Security Assessment

What is your organization’s approach to Cybersecurity?

How can you be sure it’s effective?

The volume and severity of Cyber Security attacks continues to increase.

We’ve all heard of them – but what is your organization doing to prevent them?

The pace of digital transformation, the ongoing evolution of technological trends, and the growing sophistication of cyber criminals result in organizations facing an increased volume and severity of cybersecurity attacks.

|

WannaCry Ransomware Headline:

“World’s biggest cyberattack sends countries into ‘disaster recovery mode‘”. More than 200,000 victims in at least 150 countries (2017)

UK NHS:

WannaCry ransomware attack demanding payment to regain access to vital medical records across 40 hospital trusts (2017)

Linkedin, Tumbler, Twitter

500 million passwords stolen, and offered for sale on a Dark Web Store (2016)

What is involved in our cybersecurity assessment?

All organizations now need an effective cybersecurity capability to protect the computing environment/ infrastructure from cyber attacks or incidents that can impact business continuity and to ensure the organization’s protection of key information assets

How can our Assessment benefit your organization?

IVI’s  Cybersecurity Effectiveness Assessment provides a holistic focus on safeguarding the organization’s digital assets.

$

Understand its key strengths and weaknesses in securing its IT assets

$

Agree on key cybersecurity drivers and barriers

$

Understand the cybersecurity technology trends that will have the greatest impact

$

Identify capability gaps in delivering effective cybersecurity

$

Identify priority areas to improve and invest in, and gain stakeholder consensus and buy-in

$

Implement improvement recommendations in these areas to drive cybersecurity excellence

$

Support the culture of change in its cybersecurity management approaches

It will allow your organization to have specific focus areas for cybersecurity based on an understanding of:

  • the drivers of and barriers to the cybersecurity programme
  • the evolving threat landscape
  • the proportion of the annual IT budget that is allocated to cybersecurity initiatives
  • how the organization can identify and prioritize key focus areas for cybersecurity over the next 12 months.

How does the assessment work?

The cybersecurity assessment is conducted in four main stages:

E

Preparation

 

1. Project Kick Off
Define roles
Select Participants
2. Gather strategic information
3. Internal communications

E

Survey

 

1. Survey intro meeting
Context and framework
Explain how to fill in survey
2. Online survey ~30-40mins

E

Analysis

 

1. Survey Analysis
2. Individual interviews
~60min each
3. Workshop: findings and prioritization

E

Feedback

 

1. Prepare draft and final report
2. Present and discuss assessment results
3. Action planning workshop
Establish Capability Improvement programme.

Take a sample assessment

To take the assessment, please enter your email in the box below and click Submit. Please review our Terms and Conditions before taking the survey. By clicking the Submit button below, you consent to these.

Please input your email address and click submit

Within minutes you will receive a personalized link by email that will allow you to take the survey. Once you have completed the survey, you will receive your personalized report including recommendations.

“IT-CMF provides us with a structured and systematic approach to identify the capabilities we need, a way to assess our strengths and weaknesses, and clear pathways to improve our performance.”

Suresh Kumar, Senior Executive Vice President and Chief Information Officer, BNY Mellon

Download our free guide