What is your organization’s approach to Cybersecurity?

How can you be sure it’s effective?

The volume and severity of cyber security attacks continues to increase.

We’ve all heard of them – but what is your organization doing to prevent them?

The pace of digital transformation, the ongoing evolution of technological trends, and the growing sophistication of cyber criminals result in organizations facing an increased volume and severity of cybersecurity attacks.

|

WannaCry Ransomware Headline:

“World’s biggest cyberattack sends countries into ‘disaster recovery mode‘”. More than 200,000 victims in at least 150 countries (2017)

UK NHS:

WannaCry ransomware attack demanding payment to regain access to vital medical records across 40 hospital trusts (2017)

Linkedin, Tumbler, Twitter

500 million passwords stolen, and offered for sale on a Dark Web Store (2016)

What is involved in cybersecurity?

All organizations now need an effective cybersecurity capability to protect the computing environment/ infrastructure from cyber attacks or incidents that can impact business continuity and to ensure the organization’s protection of key information assets

How can our Assessment benefit your organization?

IVI’s  Cybersecurity Effectiveness Assessment provides a holistic focus on safeguarding the organization’s digital assets.

$

Understand its key strengths and weaknesses in securing its IT assets

$

Agree on key cybersecurity drivers and barriers

$

Understand the cybersecurity technology trends that will have the greatest impact

$

Identify capability gaps in delivering effective cybersecurity

$

Identify priority areas to improve and invest in, and gain stakeholder consensus and buy-in

$

Implement improvement recommendations in these areas to drive cybersecurity excellence

$

Support the culture of change in its cybersecurity management approaches

It will allow your organization to have specific focus areas for cybersecurity based on an understanding of:

  • the drivers of and barriers to the cybersecurity programme
  • the evolving threat landscape
  • the proportion of the annual IT budget that is allocated to cybersecurity initiatives
  • how the organization can identify and prioritize key focus areas for cybersecurity over the next 12 months.

How does the assessment work?

The cybersecurity assessment is conducted in four main stages:

E

Preparation

 

1. Project Kick Off
Define roles
Select Participants
2. Gather strategic information
3. Internal communications

E

Survey

 

1. Survey intro meeting
Context and framework
Explain how to fill in survey
2. Online survey ~30-40mins

E

Analysis

 

1. Survey Analysis
2. Individual interviews
~60min each
3. Workshop: findings and prioritization

E

Feedback

 

1. Prepare draft and final report
2. Present and discuss assessment results
3. Action planning workshop
Establish Capability Improvement programme.

Want to talk to us today about how you can improve your cybersecurity effectiveness across your organization?

  • Please include international dialing code