You can always press Enter⏎ to continue
Security Assessment
START
1
Do you have access to cyber security professionals who can help improve security at your organisation?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
2
Do you know if your security posture is getting stronger over time?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
3
Where do you have visibility into misconfigurations? (select all that apply)
*
This field is required.
Endpoints
Networks
Cloud Infrastructure
Previous
Next
Submit
Press
Enter
4
Are you able to meet all your security compliance obligations?
*
This field is required.
Yes
Some
No
Previous
Next
Submit
Press
Enter
5
Where do you actively scan for vulnerabilities? (select all that apply)
*
This field is required.
Endpoints
Internal networks
External networks
Cloud environments
Previous
Next
Submit
Press
Enter
6
Does your organisation have endpoint protection?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
7
If yes, please state which vendors:
Huge
Large
Normal
Small
Ok
quote
Created with Sketch.
Ok
Previous
Next
Submit
Press
Enter
8
Do you have a security awareness training program?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
9
From which environments do you collect telemetry (logs)? (select all that apply)
*
This field is required.
Workstations
Servers
Network
Cloud
Previous
Next
Submit
Press
Enter
10
Do you know if (and where) your company is exposed on the dark web?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
11
Is your security telemetry (logs) stored in a cloud native platform?
*
This field is required.
Yes
No
Hybrid
Previous
Next
Submit
Press
Enter
12
Do you monitor for cyberthreats 24x7?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
13
Do you have a security operations centre?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
14
Does your organisation's recovery strategy include: rollback, replication, or disaster recovery?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
15
Does your organisation practice redundancy to provide multiple protected instances of critical resources? (ie. maintaining protected backups, extra capacity for information storage, location redundancy, etc.)
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
16
Do you perform post-incident activities to validate an incident has been resolved and is no longer persistent in your environment?
*
This field is required.
YES
NO
Previous
Next
Submit
Press
Enter
17
Name
*
This field is required.
First Name
Last Name
Previous
Next
Submit
Press
Enter
18
Email
*
This field is required.
example@example.com
Previous
Next
Submit
Press
Enter
19
Job Title
*
This field is required.
Previous
Next
Submit
Press
Enter
20
Company
*
This field is required.
Previous
Next
Submit
Press
Enter
21
SCORE
Previous
Next
Submit
Press
Enter
Should be Empty:
Question Label
1
of
21
See All
Go Back
Submit