Let’s start with a top-level overview and then we’ll drill down into each point in subsequent sections. Before you do anything to start actually assessing risk, you’re going to need to take stock of what data you have, what infrastructure you’re protecting, etc. You may want to start with a data audit. 

The 4 steps of a successful cyber security assessment

  1. Identification
  2. Assessment
  3. Mitigation
  4. Prevention