Insurance Readiness Assessment_Internal MM
  • Insurance Readiness Assessment

    This assessment will take approximately 20-30 minutes to complete. You may save and continue later. Please complete the fields below and provide as many details as possible. Upon completion of the assessment, you'll receive the following: analysis of your organization's accepted vs. addressed risk, current threat levels, impact on insurance underwriting and claims, insurance requirements for coverage and financial warranties, the estimated cost of a serious incident, cyber liability and/or insurance quotes, and a detailed analysis of your security gaps.
  • This form uses a 256-bit SSL connection and is PCI, GDPR and CCPA compliant. All submissions are encrypted with RSA 2048 and automatically deleted. A licensed insurance agency will prepare your insurance quote. All quotes are subject to state availability and suitability.
  • How would you like to complete your assessment?
  • Organization Information

    Please tell us a little about your organization. The better we understand your organization the more customization we can provide you in order to maximize security while reducing expenses.
  • Organization Background

    In order to determine the proper cyber security controls and the potential cost of a breach it is important for us to know to a little more about your organization.
  • Organization's Approximate Annual Revenue
  • Organization IT Environment

    The following questions are required to understand the current IT Environment of your organization. Please answer each question and provide additional information as needed.
  • Do you have an up-to-date IT Asset List?
  • Do you utilize an Asset and Inventory Management System?
  • Organization Staff + Asset / Device Management

    The following questions are required to understand the risk management in place for both your staff and digital assets + devices in use by your organization. Please answer each question and provide additional information as needed.
  • Do you have a Vendor Risk Management solution in place?
  • Does any of your Staff work remotely?
  • Does your IT + Cyber Security Staff work remotely?
  • Are your employees subject to ongoing Background Checks?
  • Are your employees subject to ongoing Identity Screening + Monitoring?
  • Do you have a written Employee Policy in place for employees to notify your organization of Identity Breaches?
  • Browse Files
    Drag and drop files here
    Choose a file
    Cancelof
  • Please tell us if any of the following Corporate Devices are issued to employees?
  • Are your employees permitted to use their own Personal Devices?
  • Does your organization utilize any of the following Mobile Devices in the course of operations?
  • Do you have a Mobile Device Management solution implemented for all related devices?
  • Do you have Mobile Protection and Information-Centric Endpoint Protection?
  • Please indicate any Digital Assets that your organization owns:
  • Do you have a Digital Asset Management Program?
  • Is your organization using any Web / Cloud Services?
  • Are you using any Cloud Security Posture Management tools that covers all cloud risks: spanning misconfigurations, vulnerabilities, identity risks, data security, API / PII / crown jewel asset exposure, and advanced threats?
  • Are you using any Cloud Native Endpoint Detection and Response solutions?
  • Do you provide Remote Access of any kind to staff or customers / members?
  • Do you have any Remote Monitoring tools in place for controlling the Configuration and State of systems?
  • Cyber Security Questionnaire

    The following questions are required to diagnosis the current cyber security environment of your organization. Please answer each question and provide additional information as needed.
  • Do you have Endpoint Detection & Response (EDR)?*
  • Do you have Next Generation Anti-Virus on all endpoints?*
  • Do you have Managed Detection & Response (MDR) in place for all sources of active detection?*
  • Do you have a Vulnerability Assessment and Management solution to discover and assess assets in your environment, including dynamic cloud or remote workforce assets?
  • Do you have Advanced Email Protection for O365/G-Suite as well as your cloud-based collaboration platforms including: pre and post delivery protection, URL and attachment sandboxing, anti-malware scanning, data loss prevention, and encryption?*
  • Do you have Multi-factor Authentication (MFA) implemented for all users?*
  • Do you have Multi-factor Authentication (MFA) implemented for all remote access and 3rd party applications?*
  • Do you have Password Identity Management and Administration tools in place?
  • Do you have Access and Rights Management tools in place?
  • Do you have Application Safelisting (whitelisting / blacklisting) enabled for all workstations and servers?*
  • Do you have Zero Trust Segmentation implemented for all endpoints?*
  • Do you use a Zero Trust Network Access Solution to control remote access?*
  • Do you have Privileged Access Management (PAM) implemented for all privileged accounts?*
  • Do you currently have Segregation of Duties + Business Controls in place for all outgoing payments / funds transfers?*
  • Do you have Single Sign On (SSO) enabled and configured for all 3rd party applications?*
  • Do you have At-Rest Encryption enabled for all endpoints and devices?*
  • Do you have a formal Patch Management Program in place which is informed by critical security and vulnerability data within 30 days?*
  • Do you have an Immutable Backup Strategy (REQUIRES: 3+ backup sources covering all systems / data and 1+ offline / inaccessible from the network where the systems/data reside)?*
  • Do you have a Log Resilience/Centralization Platform (such as a SIEM)?*
  • Do you have Next Generation Firewalls at all locations (REQUIRES: inbound / outbound proxy, threat detection, DoS protection, etc)?*
  • Technologies + Development

    The following questions are related to specific technology needs and development. Please answer each question and provide additional information as needed.
  • Do you have Operational Technologies?
  • Do you have Operational Technology Detection and Response solutions?
  • Do you develop Applications or Custom Code for yourself or customers?
  • Do you have Application and Code Security solution in place?
  • Do you develop Web Applications or APIs, or utilize APIs for any of your own Web Applications?
  • Do you have Web Application and API Security solutions in place?
  • Do you host your own Custom Email or any similar Custom Applications?
  • Do you have a DDoS Attack Mitigation solution in place?
  • Cyber Security Program

    The following questions are required in order to better understand your written policies + procedures and response plans. Please answer each question and provide additional information as needed.
  • Do you have a Written Cyber Security Program in place which aligns with regulatory requirements and/or industry standards (NIST, CIS, etc)?*
  • Browse Files
    Drag and drop files here
    Choose a file
    Cancelof
  • Is your organization (OR any of your customers) subject to additional regulatory requirements by any of the following regulated industries?
  • Do you have an Incident Response Plan in place currently?
  • Is your Incident Response Plan approved by your insurance carrier?
  • Do you have a dedicated Computer Security Incident Response Team (CSIRT)?
  • Is your Computer Security Incident Response Team (CSIRT) approved by and aligned with your insurance carrier?
  • Cyber Liability Insurance

    The following questions are required to establish and understanding of your current cyber insurance in force (or desired coverage). Please provide as many details as known related to the coverage.
  • Does your organization currently have Cyber Liability Insurance?
  • Is the insurance policy part of a Group/Membership Plan or your own coverage?
  •  - -
  • Have you received an Offer for Renewal?
  • Is Cyber Liability Insurance desired?
  •  - -
  • Please indicate if you would like recommendations for any additional coverage:
  •  - -
  • Should be Empty: