-
-
-
- How would you like to complete your assessment?
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Organization's Approximate Annual Revenue
-
-
-
-
-
-
-
-
-
-
- Do you have an up-to-date IT Asset List?
- Do you utilize an Asset and Inventory Management System?
-
-
-
-
-
-
-
- Do you have a Vendor Risk Management solution in place?
-
-
-
-
- Does any of your Staff work remotely?
- Does your IT + Cyber Security Staff work remotely?
-
- Are your employees subject to ongoing Background Checks?
-
- Are your employees subject to ongoing Identity Screening + Monitoring?
-
- Do you have a written Employee Policy in place for employees to notify your organization of Identity Breaches?
-
- Please tell us if any of the following Corporate Devices are issued to employees?
- Are your employees permitted to use their own Personal Devices?
- Does your organization utilize any of the following Mobile Devices in the course of operations?
- Do you have a Mobile Device Management solution implemented for all related devices?
-
- Do you have Mobile Protection and Information-Centric Endpoint Protection?
-
-
- Please indicate any Digital Assets that your organization owns:
- Do you have a Digital Asset Management Program?
-
- Is your organization using any Web / Cloud Services?
-
-
-
-
-
- Are you using any Cloud Security Posture Management tools that covers all cloud risks: spanning misconfigurations, vulnerabilities, identity risks, data security, API / PII / crown jewel asset exposure, and advanced threats?
-
-
- Are you using any Cloud Native Endpoint Detection and Response solutions?
-
-
-
- Do you provide Remote Access of any kind to staff or customers / members?
-
- Do you have any Remote Monitoring tools in place for controlling the Configuration and State of systems?
-
-
-
- Do you have Endpoint Detection & Response (EDR)?*
-
-
- Do you have Next Generation Anti-Virus on all endpoints?*
-
-
- Do you have Managed Detection & Response (MDR) in place for all sources of active detection?*
-
-
- Do you have a Vulnerability Assessment and Management solution to discover and assess assets in your environment, including dynamic cloud or remote workforce assets?
-
-
-
-
- Do you have Advanced Email Protection for O365/G-Suite as well as your cloud-based collaboration platforms including: pre and post delivery protection, URL and attachment sandboxing, anti-malware scanning, data loss prevention, and encryption?*
-
-
- Do you have Multi-factor Authentication (MFA) implemented for all users?*
- Do you have Multi-factor Authentication (MFA) implemented for all remote access and 3rd party applications?*
-
-
- Do you have Password Identity Management and Administration tools in place?
-
-
- Do you have Access and Rights Management tools in place?
-
-
- Do you have Application Safelisting (whitelisting / blacklisting) enabled for all workstations and servers?*
- Do you have Zero Trust Segmentation implemented for all endpoints?*
-
-
- Do you use a Zero Trust Network Access Solution to control remote access?*
-
-
- Do you have Privileged Access Management (PAM) implemented for all privileged accounts?*
-
-
- Do you currently have Segregation of Duties + Business Controls in place for all outgoing payments / funds transfers?*
- Do you have Single Sign On (SSO) enabled and configured for all 3rd party applications?*
- Do you have At-Rest Encryption enabled for all endpoints and devices?*
- Do you have a formal Patch Management Program in place which is informed by critical security and vulnerability data within 30 days?*
- Do you have an Immutable Backup Strategy (REQUIRES: 3+ backup sources covering all systems / data and 1+ offline / inaccessible from the network where the systems/data reside)?*
-
-
- Do you have a Log Resilience/Centralization Platform (such as a SIEM)?*
-
-
- Do you have Next Generation Firewalls at all locations (REQUIRES: inbound / outbound proxy, threat detection, DoS protection, etc)?*
-
-
- Do you have Operational Technologies?
- Do you have Operational Technology Detection and Response solutions?
-
-
- Do you develop Applications or Custom Code for yourself or customers?
- Do you have Application and Code Security solution in place?
-
-
- Do you develop Web Applications or APIs, or utilize APIs for any of your own Web Applications?
- Do you have Web Application and API Security solutions in place?
-
-
- Do you host your own Custom Email or any similar Custom Applications?
- Do you have a DDoS Attack Mitigation solution in place?
-
-
-
- Do you have a Written Cyber Security Program in place which aligns with regulatory requirements and/or industry standards (NIST, CIS, etc)?*
-
- Is your organization (OR any of your customers) subject to additional regulatory requirements by any of the following regulated industries?
- Do you have an Incident Response Plan in place currently?
- Is your Incident Response Plan approved by your insurance carrier?
- Do you have a dedicated Computer Security Incident Response Team (CSIRT)?
-
- Is your Computer Security Incident Response Team (CSIRT) approved by and aligned with your insurance carrier?
-
-
-
-
- Does your organization currently have Cyber Liability Insurance?
-
-
- Is the insurance policy part of a Group/Membership Plan or your own coverage?
-
-
-
- Have you received an Offer for Renewal?
-
- Is Cyber Liability Insurance desired?
-
-
- Please indicate if you would like recommendations for any additional coverage:
-
-
-
-
-
- Should be Empty: