The scope of our Cyber Risk Assessment includes the following activities. Cyberysk automates the assessment through use of several security tools. The depth of these activities is time limited, based on the number of devices and scope of issues discovered. 

  1. Discover information assets within the environment 
  2. Discover at-risk data on desktop and laptop devices (connected during discovery) 
  3. Foundational cybersecurity technical testing within the environment 
  4. Review cybersecurity related documentation including policies & procedures 
  5. Report on current cyber risk status across the eight primary cyber risk domains 
  6. Provide recommendations to mitigate identified cyber risks 
  7. Onsite / Virtual presentation of Executive Summary & recommendations