Cyber Security Risk Assessment
Please complete the fields below for the organization that would like an assessment.
This form is to be completed by Reseller Partners only.
Please indicate the name of the Reseller completing this assessment and provide the Submitter's information at the bottom of the form prior to submittal. The Submitter will receive a copy of the completed assessment via email immediately after submittal.
Reseller Completing This Assessment
*
Organization Information
Please tell us a little about your organization. The better we understand your organization the more customization we can provide you in order to maximize security while reducing expenses.
Organization Full Legal Name
*
Organization DBA/Trade Name
Main Contact Full Name
*
First Name
Last Name
Main Contact Title
*
Main Contact Phone #
*
Main Contact Email Address
*
Organization Shipping Address
Organization Billing Address
Organization Phone Number
Organization Email Address
Organization Website
Organization Background
In order to determine the proper cyber security controls and the potential cost of a breach it is important for us to know to a little more about your organization.
What year was the Organization established?
What is the Organization's Primary Industry(s)?
How many customers/members/users does the Organization have currently?
Total Number of Locations
Total Number of Locations Outside of the United States
Organization's Approximate Annual Revenue
$50,000 - $500,000
$500,000 - $1mm
$1mm - $2.5mm
$2.5mm - $5.0mm
$5.0mm - $10mm
$10mm - $25mm
$25mm - $50mm
$50mm - $100mm
$100mm - $500mm
$500mm - $1b
Over $1b
Organization's Approximate Annual Operations Cost
Please use this section to provide us with any other relevant information or general notes related to the Organization:
Organization IT Environment
The following questions are required to understand the current IT Environment of your organization. Please answer each question and provide additional information as needed.
Total Number of Workstations
Total Number of Laptops
Total Number of Servers (Physical)
Total Number of Servers (Virtual)
Total Number of Endpoints
Approximate Number of Users Accessing Networks
Total Number of IT Assets
Do you have an up-to-date IT Asset List?
Yes
No
Please use this section to provide us with any other relevant information or notes related to the IT Environment:
Organization Staff + Asset / Device Management
The following questions are required to understand the risk management in place for both your staff and digital assets + devices in use by your organization. Please answer each question and provide additional information as needed.
Total Number of Full Time Employees
*
Total Number of Part Time Employees
Total Number of Outside Contractors
Total Number of IT Staff (All Departments)
*
Total Number of Cyber Security Staff
*
Does any of your Staff work remotely?
Yes
No
Does your IT + Cyber Security Staff work remotely?
Yes
No
Where is your IT + Cyber Security Staff located?
Street Address
Street Address Line 2
City
State / Province
Postal / Zip Code
Are your employees subject to ongoing Background Checks?
Yes
Yes. But, only one time at initial hiring.
No
Which provider are you using for employee Background Checks?
Are your employees subject to ongoing Identity Screening + Monitoring?
Yes
Yes. But, only one time at initial hiring.
No
Which provider are you using for employee Identity Screening + Monitoring?
Do you have a written Employee Policy in place for employees to notify your organization of Identity Breaches?
Yes
No
Unsure
Please upload a copy of your Employee Identity Breach Notification Policy.
Browse Files
Drag and drop files here
Choose a file
Cancel
of
Please tell us if any of the following Corporate Devices are issued to employees?
Cell Phone
Desktop (for remote access)
Laptop
Tablet
NONE
Other
Are your employees permitted to use their own Personal Devices?
Yes
No
Does your organization utilize any of the following Mobile Devices in the course of operations?
Cell Phone
Credit Card Reader
Laptop
Mobile Hotspot
Tablet
NONE
Other
Do you have a Mobile Device Management solution implemented for all related devices?
Yes
No
Unsure
Please tell us which Mobile Device Management solutions you currently have implemented and/or any related details:
Please indicate any Digital Assets that your organization owns:
Proprietary Software
Proprietary Hardware + Related IT
Digital Manuscripts / Learning Management Systems
Digital Audio / Video Assets
Metadata
Cryptocurrency / NFTs / Tokens
Social Media Accounts
Regulated / Official Security Tokens
NONE
Other
Do you have a Digital Asset Management Program?
Yes
No
Unsure
Please tell us more about the Digital Asset Management Program that you currently using and/or any related details:
Is your organization using any Web / Cloud Services?
Yes
No
Unsure
Total Number of Virtual Machines
Virtual Machines, such as, but not limited to: Linux and Windows, running on platforms such as AWS EC2, Azure VMs, or Google Compute Engine
Total Number of Container Hosts
Container Hosts, such as, but not limited to: those running Linux or Windows containers, on platforms such as Amazon ECS or EKS, Azure Kubernetes Service, or Google Kubernetes Engine.
Total Number of Serverless Functions
Serverless Functions, such as, but not limited to: AWS Lambda, Azure Functions, or Google Cloud Functions.
Total Number of VM Machine Images
VM Machine Images, such as, but not limited to: Amazon Machine Images (AMIs), Azure machine images, or Google machine images, to be scanned.
Total Number of Container Images in Registry
Container Images in Registry in services such as Amazon Elastic Container Registry (ECR), Azure Container Registry (ACR), Google Cloud Container Registry (GCR), and others to be supported and scanned.
Are you using any Cloud Security solution that covers all cloud risks: spanning misconfigurations, vulnerabilities, identity risks, data security, API / PII / crown jewel asset exposure, and advanced threats?
Yes
No
Unsure
Which of the following Cloud Security solutions are you currently using?
Please Select
Lacework
Prisma Cloud
Orca Security
Rapid7
Tenable
Wiz
Other
Which other Cloud Security solution are you using?
Please tell us more about the Web / Cloud Services that you currently using and/or any related details:
Do you provide Remote Access of any kind to staff or customers / members?
Yes
No
Who is your current Remote Access Vendor?
Cyber Security Questionnaire
The following questions are required to diagnosis the current cyber security environment of your organization. Please answer each question and provide additional information as needed.
Do you have Endpoint Detection & Response (EDR)?
*
Yes
No
Unsure
Which of the following EDR solutions are you currently using?
Please Select
Cortex XDR by Palo Alto
Crowd Strike Falcon EDR
Microsoft Defender for Endpoint
Rapid7
Sentinel One
Other
What other EDR solution are you using?
Do you have Next Generation Anti-Virus on all endpoints?
*
Yes
No
Unsure
Which of the following Next Generation Anti-Virus solutions are you currently using?
Please Select
CrowdStrike NGAV
ESET
Malwarebytes
Microsoft
SentinelOne NGAV
Other
What other Next Generation Anti-Virus solution are using?
Do you have Managed Detection & Response (MDR) in place for all sources of active detection?
*
Yes
No
Unsure
Which of the following MDR solutions are you currently using?
Please Select
Binary Defense
CrowdStrike
Deepwatch
Expel
Mandiant
Ontinue
Palo Alto
Patriot
Rapid7
Red Canary
Other
What other MDR solution are you using?
Which of the following Email Providers are you currently using?
Please Select
Apple
Google
Microsoft
Proton
Zoho
Other
Who is your current Email Provider?
Do you have Advanced Email Protection for O365/G-Suite as well as your cloud-based collaboration platforms including: pre and post delivery protection, URL and attachment sandboxing, anti-malware scanning, data loss prevention, and encryption?
*
Yes
No
Unsure
Which of the following Advanced Email Protection solutions are you currently using?
Please Select
Abnormal Security
Avanan
IronScales
Microsoft M365 P2 Email Security
Proofpoint
Other
What other Advanced Email Protection solution are you using?
Do you have Multi-factor Authentication (MFA) implemented for all users?
*
Yes
No
Unsure
Do you have Multi-factor Authentication (MFA) implemented for all remote access and 3rd party applications?
*
Yes
No
Unsure
What MFA solution are you currently using?
Please Select
CrowdStrike Falcon Identity
CyberReason
Delinea
Duo
Entra ID
Microsoft
Okta
Silverfort
Yubikey
Other
What other MFA solution are you using?
Do you have Application Safelisting (whitelisting / blacklisting) enabled for all workstations and servers?
*
Yes
No
Unsure
Do you have Zero Trust Segmentation implemented for all endpoints?
*
Yes
No
Unsure
Do you use a Zero Trust Network Access Solution to control remote access?
*
Yes
No
Unsure
Which of the following Zero Trust Network Access Solutions do you currently use?
Please Select
Cisco
Citrix
Illumio
Jamf
Palo Alto
Zscaler
Other
What other Zero Trust Network Access Solution are you using?
Do you have Privileged Access Management (PAM) implemented for all privileged accounts?
*
Yes
No
Unsure
Which Privileged Access Management (PAM) solution are you currently using?
Please Select
BeyondTrust
CyberArk
Delinea
Other
What other Privileged Access Management solution are you using?
Do you have a Password Manager implemented for all users?
*
Yes
No
Unsure
Do you currently have Segregation of Duties + Business Controls in place for all outgoing payments / funds transfers?
*
Yes
No
Unsure
Do you have Single Sign On (SSO) enabled and configured for all 3rd party applications?
*
Yes
No
Unsure
Do you have At-Rest Encryption enabled for all endpoints / devices?
*
Yes
No
Unsure
Do you have a formal Patch Management Program in place which is informed by critical security and vulnerability data within 30 days?
*
Yes
No
Unsure
Do you have an Immutable Backup Strategy (REQUIRES: 3+ backup sources covering all systems / data and 1+ offline / inaccessible from the network where the systems/data reside)?
*
Yes
Yes, we have a Backup Strategy. But, it does NOT meet these requirements.
No
Unsure
Do you have a Vulnerability Management Program which performs scans at least bi-weekly?
*
Yes
No
Unsure
Do you have a Log Resilience/Centralization Platform (such as a SIEM)?
*
Yes
No
Unsure
Do you have Next Generation Firewalls at all locations (REQUIRES: inbound / outbound proxy, threat detection, DoS protection, etc)?
*
Yes
Yes, we have Firewalls. But, they are NOT Next Generation.
No
Unsure
Please use this section to provide us with any other relevant information or notes related to your current Cyber Security Controls + Environment:
Cyber Security Program
The following questions are required in order to better understand your written policies + procedures and response plans. Please answer each question and provide additional information as needed.
Do you have a Written Cyber Security Program in place which aligns with regulatory requirements and/or industry standards (NIST, CIS, etc)?
*
Yes
No
Unsure
Please upload a copy of your current Cyber Security Program.
Browse Files
Drag and drop files here
Choose a file
Cancel
of
Is your organization (OR any of your customers) subject to additional regulatory requirements by any of the following regulated industries?
Financial Services
Government
Healthcare
Insurance
Security
Other
Do you have an Incident Response Plan in place currently?
Yes
No
Unsure
Is your Incident Response Plan approved by your insurance carrier?
Yes
No
Unsure
Do you have a dedicated Computer Security Incident Response Team (CSIRT)?
Yes (internal)
Yes (external)
No
Who is your external Computer Security Incident Response Team?
Is your Computer Security Incident Response Team (CSIRT) approved by and aligned with your insurance carrier?
Yes
No
Unsure
How often are you conducting Tabletop Exercises?
Please Select
At Least 1X Per Year
At Least 4X Per Year
At Least 6X Per Year
At Least 12X Per Year
More than 12X Per Year
NEVER
Please tell us more about your current Incident Response Plan:
Please use this section to provide us with any other relevant information or notes related to your current Cyber Security Program and planning:
Cyber Liability Insurance
The following questions are required to establish and understanding of your current cyber insurance in force (or desired coverage). Please provide as many details as known related to the coverage.
Does your organization currently have Cyber Liability Insurance?
Yes
No
Unsure
Who is your current Insurance Carrier?
What type of insurance policy is in force?
Please Select
Stand Alone Cyber Liability Insurance
Cyber Liability Rider (included with BOP)
Cyber Liability Rider (included with General Liability)
Other
Is the insurance policy part of a Group/Membership Plan or your own coverage?
Our Organization's Own Insurance Policy
Part of a Membership Plan Policy
Part of a Group Policy
Unsure
What is the existing coverage limit Per Incident?
What is the existing coverage limit Policy Maximum?
When is the Renewal Date for this policy?
-
Month
-
Day
Year
Date
Have you received an Offer for Renewal?
Yes
No
Unsure
Please list the dates and provide details (ransomware, business email compromise, data loss, etc) of any incidents or cyber insurance claims which occurred in the last 5 years:
Is Cyber Liability Insurance desired?
Yes
No
What is the amount of cover desired/required?
When would you like coverage to begin?
-
Month
-
Day
Year
Date
Please indicate if you would like recommendations for any additional coverage:
Comprehensive Commercial Liability Insurance
Tech E+O Insurance
Device + Hardware Insurance
Directors + Officers Insurance
Workers' Compensation Insurance
Digital Asset Insurance
Social Media Account Insurance
Identity Theft
Please use this section to provide us with any other relevant information or notes related to your current Cyber Insurance or desired / required coverage:
Submitter Name
*
First Name
Last Name
Submitter Phone Number
*
Please enter a valid phone number.
Submitter Email
*
example@example.com
Date Submitted
*
-
Month
-
Day
Year
Date
Hour Minutes
AM
PM
AM/PM Option
Submit
Should be Empty: