Cyber Security Risk Assessment
This assessment will take approximately 15-20 minutes to complete. You may save and continue later. Please complete the fields below and provide as many details as possible. Upon completion of this form you'll receive 1) an emailed copy of this assessment form immediately, 2) an assessment of the organization's accepted vs. addressed risk, the estimated cost of a serious incident or breach, a detailed analysis of the organization's security gaps, and further recommendations.
Referral Partner Company Name
Please indicate the name of the Referral Partner completing this assessment and provide the Submitter's information at the bottom of the form prior to submittal. The Submitter will receive a copy of the completed assessment via email immediately after submittal.
Referral Partner Main Contact
First Name
Last Name
Referral Partner Email Address
example@example.com
How would you like to complete the assessment?
I'll complete the assessment online.
I'd like to schedule a workshop with an Antigen staff member.
Organization Information
Please tell us a little about your organization. The better we understand your organization the more customization we can provide you in order to maximize security while reducing expenses.
Schedule a meeting with Christiana Stramaglia below. After scheduling you may close this window.
Organization Full Legal Name
*
Organization DBA/Trade Name
Main Contact Full Name
*
First Name
Last Name
Main Contact Title
*
Main Contact Phone #
*
Main Contact Email Address
*
Organization Shipping Address
Organization Billing Address
Organization Phone Number
Organization Email Address
Organization Website
Organization Background
In order to determine the proper cyber security controls and the potential cost of a breach it is important for us to know to a little more about your organization.
What year was the Organization established?
What is the Organization's Primary Industry(s)?
How many customers/members/users does the Organization have currently?
Total Number of Locations
Total Number of Locations Outside of the United States
Organization's Approximate Annual Revenue
Start Up - $1mm
$1mm - $2.0mm
$2.0mm - $10.0
$10mm - $25mm
$25mm - $50mm
$50mm - $100mm
$100mm - $500mm
$500mm - $1b
Over $1b
Organization's Approximate Annual Operations Cost
This information is necessary in order to prepare your organization with an estimate of the cost of a serious incident or breach.
Please use this section to provide us with any other relevant information or general notes related to the Organization:
Organization IT Environment
The following questions are required to understand the current IT Environment of your organization. Please answer each question and provide additional information as needed.
Total Number of Workstations
Total Number of Laptops
Total Number of Servers (Physical)
Total Number of Servers (Virtual)
Total Number of Endpoints
Approximate Number of Users Accessing Networks
Total Number of IT Assets
Do you have an up-to-date IT Asset List?
Yes
No
Do you utilize an Asset and Inventory Management System?
Yes
No
Which Asset and Inventory Management System are you currently using?
Please Select
Axonius
Armis
JupiterOne
runZero
Other
Which other Asset and Inventory Management System are you using?
Please use this section to provide us with any other relevant information or notes related to the IT Environment:
Organization Staff + Asset / Device Management
The following questions are required to understand the risk management in place for both your staff and digital assets + devices in use by your organization. Please answer each question and provide additional information as needed.
Total Number of Full Time Employees
*
Total Number of Part Time Employees
Total Number of Outside Vendors and Contractors
*Vendors or Contractors with access to your environment.
Do you have a Vendor Risk Management solution in place?
Yes
No
Which of the following Vendor Risk Management solutions are you currently using?
Please Select
OneTrust
ServiceNow
Other
What other Vendor Risk Management solution are you using?
Total Number of Internal IT Staff (All Departments)
*
Total Number of Cyber Security Staff
*
Does any of your Staff work remotely?
Yes
No
Does your IT + Cyber Security Staff work remotely?
Yes
No
Where is your IT + Cyber Security Staff located?
Street Address
Street Address Line 2
City
State / Province
Postal / Zip Code
Are your employees subject to ongoing Background Checks?
Yes
Yes. But, only one time at initial hiring.
No
Which provider are you using for employee Background Checks?
Are your employees subject to ongoing Identity Screening + Monitoring?
Yes
Yes. But, only one time at initial hiring.
No
Which provider are you using for employee Identity Screening + Monitoring?
Do you have a written Employee Policy in place for employees to notify your organization of Identity Breaches?
Yes
No
Unsure
Please upload a copy of your Employee Identity Breach Notification Policy.
Browse Files
Drag and drop files here
Choose a file
Cancel
of
Please tell us if any of the following Corporate Devices are issued to employees?
Cell Phone
Desktop (for remote access)
Laptop
Tablet
NONE
Other
Are your employees permitted to use their own Personal Devices?
Yes
No
Does your organization utilize any of the following Mobile Devices in the course of operations?
Cell Phone
Credit Card Reader
Laptop
Mobile Hotspot
Tablet
NONE
Other
Do you have a Mobile Device Management solution implemented for all related devices?
Yes
No
Unsure
Please tell us which Mobile Device Management solutions you currently have implemented and/or any related details:
Do you have Mobile Protection and Information-Centric Endpoint Protection?
Yes
No
Which Mobile Protection and Information Centric Endpoint Protection are you currently using?
Please Select
Blackberry Enterprise Mobility Suite
Dell Data Protection
Microsoft Bitlocker
Other
Which other Mobile Protection and Information Centric Endpoint Protection are you using?
Please indicate any Digital Assets that your organization owns:
Proprietary Software
Proprietary Hardware + Related IT
Digital Manuscripts / Learning Management Systems
Digital Audio / Video Assets
Metadata
Cryptocurrency / NFTs / Tokens
Social Media Accounts
Regulated / Official Security Tokens
NONE
Other
Do you have a Digital Asset Management Program?
Yes
No
Unsure
Please tell us more about the Digital Asset Management Program that you currently using and/or any related details:
Is your organization using any Web / Cloud Services?
Yes
No
Total Number of Virtual Machines
Virtual Machines, such as, but not limited to: Linux and Windows, running on platforms such as AWS EC2, Azure VMs, or Google Compute Engine
Total Number of Container Hosts
Container Hosts, such as, but not limited to: those running Linux or Windows containers, on platforms such as Amazon ECS or EKS, Azure Kubernetes Service, or Google Kubernetes Engine.
Total Number of Serverless Functions
Serverless Functions, such as, but not limited to: AWS Lambda, Azure Functions, or Google Cloud Functions.
Total Number of VM Machine Images
VM Machine Images, such as, but not limited to: Amazon Machine Images (AMIs), Azure machine images, or Google machine images, to be scanned.
Total Number of Container Images in Registry
Container Images in Registry in services such as Amazon Elastic Container Registry (ECR), Azure Container Registry (ACR), Google Cloud Container Registry (GCR), and others to be supported and scanned.
Are you using any Cloud Security Posture Management tools that covers all cloud risks: spanning misconfigurations, vulnerabilities, identity risks, data security, API / PII / crown jewel asset exposure, and advanced threats?
Yes
No
Unsure
Which of the following Cloud Security Posture Management tools are you currently using?
Please Select
Lacework
Prisma Cloud
Orca Security
Rapid7
Tenable
Wiz
Other
Which other Cloud Security tool are you using?
Are you using any Cloud Native Endpoint Detection and Response solutions?
Yes
No
Which Cloud Native EDR are you currently using?
Please Select
CrowdStrike
Microsoft Defender for Cloud
Orca Security
Rapid7
SentinelOne
Wiz
Other
Which other Cloud Native EDR are you using?
Please tell us more about the Web / Cloud Services that you currently using and/or any related details:
Do you provide Remote Access of any kind to staff or customers / members?
Yes
No
Who is your current Remote Access Vendor?
Do you have any Remote Monitoring tools in place for controlling the Configuration and State of systems?
Yes
No
Which of the following Configuration Management tools are you currently using?
Please Select
Cisco
Citrix
Connectwise
Microsoft Intune
NinjaOne
Other
What other Configuration Management tool are you using?
Cyber Security Questionnaire
The following questions are required to diagnosis the current cyber security environment of your organization. Please answer each question and provide additional information as needed.
Do you have Endpoint Detection & Response (EDR)?
*
Yes
No
Unsure
Which of the following EDR solutions are you currently using?
Please Select
Cortex XDR by Palo Alto
Crowd Strike Falcon EDR
Microsoft Defender for Endpoint
Rapid7
Sentinel One
Other
What other EDR solution are you using?
Do you have Next Generation Anti-Virus on all endpoints?
*
Yes
No
Unsure
Which of the following Next Generation Anti-Virus solutions are you currently using?
Please Select
CrowdStrike NGAV
ESET
Malwarebytes
Microsoft
SentinelOne NGAV
Other
What other Next Generation Anti-Virus solution are using?
Do you have Managed Detection & Response (MDR) in place for all sources of active detection?
*
Yes
No
Unsure
Which of the following MDR solutions are you currently using?
Please Select
Binary Defense
CrowdStrike
Deepwatch
Expel
Mandiant
Ontinue
Palo Alto
Patriot
Rapid7
Red Canary
Other
What other MDR solution are you using?
Do you have a Vulnerability Assessment and Management solution to discover and assess assets in your environment, including dynamic cloud or remote workforce assets?
Yes
No
Which Vulnerability Assessment and Management solution are you currently using?
Please Select
Tenable
Other
Which other Vulnerability Assessment and Management solution are you using?
Which of the following Email Providers are you currently using?
Please Select
Apple
Google
Microsoft
Proton
Zoho
Other
Who is your current Email Provider?
Do you have Advanced Email Protection for O365/G-Suite as well as your cloud-based collaboration platforms including: pre and post delivery protection, URL and attachment sandboxing, anti-malware scanning, data loss prevention, and encryption?
*
Yes
No
Unsure
Which of the following Advanced Email Protection solutions are you currently using?
Please Select
Abnormal Security
Avanan
IronScales
Microsoft M365 P2 Email Security
Proofpoint
Other
What other Advanced Email Protection solution are you using?
Do you have Multi-factor Authentication (MFA) implemented for all users?
*
Yes
No
Unsure
Do you have Multi-factor Authentication (MFA) implemented for all remote access and 3rd party applications?
*
Yes
No
Unsure
What MFA solution are you currently using?
Please Select
CrowdStrike Falcon Identity
CyberReason
Delinea
Duo
Entra ID
Microsoft
Okta
Silverfort
Yubikey
Other
What other MFA solution are you using?
Do you have Password Identity Management and Administration tools in place?
Yes
No
Which Identity Management and Administration tool are you currently using?
Please Select
CyberReason
Delinea
Microsoft Entra ID
Okta
Silverfort
Yubikey
Other
Which other Identity Management and Administration tool are you using?
Do you have Access and Rights Management tools in place?
Yes
No
Which Access and Rights Management tool are you currently using?
Please Select
AWS IAM
CyberArk
Microsoft Entra ID
Okta
Other
What other Access and Rights Management tool are you using?
Do you have Application Safelisting (whitelisting / blacklisting) enabled for all workstations and servers?
*
Yes
No
Unsure
Do you have Zero Trust Segmentation implemented for all endpoints?
*
Yes
No
Unsure
Which Zero Trust Segmentation solution to you currently have implemented?
Please Select
Akamai Guardicore Segmentation
Illumio
Other
What other Zero Trust Segmentation solution are you currently using?
Do you use a Zero Trust Network Access Solution to control remote access?
*
Yes
No
Unsure
Which of the following Zero Trust Network Access Solutions do you currently use?
Please Select
Cisco
Citrix
Jamf
Palo Alto
Zscaler
Other
What other Zero Trust Network Access Solution are you using?
Do you have Privileged Access Management (PAM) implemented for all privileged accounts?
*
Yes
No
Unsure
Which Privileged Access Management (PAM) solution are you currently using?
Please Select
BeyondTrust
CyberArk
Delinea
Other
What other Privileged Access Management solution are you using?
Do you currently have Segregation of Duties + Business Controls in place for all outgoing payments / funds transfers?
*
Yes
No
Unsure
Do you have Single Sign On (SSO) enabled and configured for all 3rd party applications?
*
Yes
No
Unsure
Do you have At-Rest Encryption enabled for all endpoints and devices?
*
Yes
No
Unsure
Do you have a formal Patch Management Program in place which is informed by critical security and vulnerability data within 30 days?
*
Yes
No
Unsure
Do you have an Immutable Backup Strategy (REQUIRES: 3+ backup sources covering all systems / data and 1+ offline / inaccessible from the network where the systems/data reside)?
*
Yes
Yes, we have a Backup Strategy. But, it does NOT meet these requirements.
No
Unsure
Which Immutable Backup Strategy are you currently using?
Please Select
Acronis
Datto
Unitrends
Other
Which other Immutable Backup Strategy are you using?
Do you have a Log Resilience/Centralization Platform (such as a SIEM)?
*
Yes
No
Unsure
Which of the following SIEMs are you currently using?
Please Select
Elastic
InsightIDR
Logpoint
LogRhythm
Microsoft Sentinel
Qradar
Red Canary
Splunk
Sumologic
Other
What other SIEM are you using?
Do you have Next Generation Firewalls at all locations (REQUIRES: inbound / outbound proxy, threat detection, DoS protection, etc)?
*
Yes
Yes, we have Firewalls. But, they are NOT Next Generation.
No
Unsure
Please use this section to provide us with any other relevant information or notes related to your current Cyber Security Controls + Environment:
Technologies + Development
The following questions are related to specific technology needs and development. Please answer each question and provide additional information as needed.
Do you have Operational Technologies?
Yes
No
Do you have Operational Technology Detection and Response solutions?
Yes
No
Which of the following Operational Technology Detection and Response solutions are you currently using?
Please Select
BeyondTrust
CheckPoint
Dragos
Microsoft Defender for IoT
Tenable
Other
What other Operational Technology Detection and Response solution are you using?
Do you develop Applications or Custom Code for yourself or customers?
Yes
No
Do you have Application and Code Security solution in place?
Yes
No
Which of the following Application and Code Security solutions are you currently using?
Please Select
Burp Suite
GitLab
Qualys
Rapid7
Snyk
Other
What other Application and Code Security solution are you using?
Do you develop Web Applications or APIs, or utilize APIs for any of your own Web Applications?
Yes
No
Do you have Web Application and API Security solutions in place?
Yes
No
Which of the following Web Application and API Security solutions are you currently using?
Please Select
Akamai
AWS WAF
Azure WAF
Cloudflare
Imperva
Qualys
Other
What other Web Application and API Security solution are you using?
Do you host your own Custom Email or any similar Custom Applications?
Yes
No
Do you have a DDoS Attack Mitigation solution in place?
Yes
No
Which of the following DDoS Attack Mitigation solutions are you currently using?
Please Select
Akamai
Azure DDoS
AWS DDoS
Cloudflare
Google DDoS
Imperva
Palo Alto
Other
Which other DDoS Attack Mitigation solution are you using?
Cyber Security Program
The following questions are required in order to better understand your written policies + procedures and response plans. Please answer each question and provide additional information as needed.
Do you have a Written Cyber Security Program in place which aligns with regulatory requirements and/or industry standards (NIST, CIS, etc)?
*
Yes
No
Unsure
Please upload a copy of your current Cyber Security Program.
Browse Files
Drag and drop files here
Choose a file
Cancel
of
Is your organization (OR any of your customers) subject to additional regulatory requirements by any of the following regulated industries?
Financial Services
Government
Healthcare
Insurance
Security
Other
Do you have an Incident Response Plan in place currently?
Yes
No
Unsure
Is your Incident Response Plan approved by your insurance carrier?
Yes
No
Unsure
Do you have a dedicated Computer Security Incident Response Team (CSIRT)?
Yes (internal)
Yes (external)
No
Who is your external Computer Security Incident Response Team?
Is your Computer Security Incident Response Team (CSIRT) approved by and aligned with your insurance carrier?
Yes
No
Unsure
How often are you conducting Tabletop Exercises?
Please Select
At Least 1X Per Year
At Least 4X Per Year
At Least 6X Per Year
At Least 12X Per Year
More than 12X Per Year
NEVER
Please tell us more about your current Incident Response Plan:
Please use this section to provide us with any other relevant information or notes related to your current Cyber Security Program and planning:
Cyber Liability Insurance
The following questions are required to establish and understanding of your current cyber insurance in force (or desired coverage). Please provide as many details as known related to the coverage.
Does your organization currently have Cyber Liability Insurance?
Yes
No
Unsure
Who is your current Insurance Carrier?
What type of insurance policy is in force?
Please Select
Stand Alone Cyber Liability Insurance
Cyber Liability Rider (included with BOP)
Cyber Liability Rider (included with General Liability)
Other
Is the insurance policy part of a Group/Membership Plan or your own coverage?
Our Organization's Own Insurance Policy
Part of a Membership Plan Policy
Part of a Group Policy
Unsure
What is the existing coverage limit Per Incident?
What is the existing coverage limit Policy Maximum?
When is the Renewal Date for this policy?
-
Month
-
Day
Year
Date
Have you received an Offer for Renewal?
Yes
No
Unsure
Please list the dates and provide details (ransomware, business email compromise, data loss, etc) of any incidents or cyber insurance claims which occurred in the last 5 years:
Is Cyber Liability Insurance desired?
Yes
No
What is the amount of cover desired/required?
When would you like coverage to begin?
-
Month
-
Day
Year
Date
Please indicate if you would like recommendations for any additional coverage:
Comprehensive Commercial Liability Insurance
Tech E+O Insurance
Device + Hardware Insurance
Directors + Officers Insurance
Workers' Compensation Insurance
Digital Asset Insurance
Social Media Account Insurance
Identity Theft
Please use this section to provide us with any other relevant information or notes related to your current Cyber Insurance or desired / required coverage:
Submitter Name
*
First Name
Last Name
Submitter Email
*
example@example.com
Date Submitted
*
-
Month
-
Day
Year
Date
Hour Minutes
AM
PM
AM/PM Option
Save
Submit
Should be Empty: