This service evaluates a function or team within your cybersecurity program. The foundation of each assessment is based on reputable practices such as a NIST 800 series document. Remaining testing procedures are developed by Gideon Rasmussen based on 20+ years of cybersecurity experience within corporate and military organizations.
This is a customized service based on the needs of the client. Examples of completed assessments include:
Program architecture is evaluated within the scope of each assessment:
 
 
 
 
 
 
Fees and Payment
The assessment is billed at a flat rate. The engagement begins once the Statement of Work and Contract are signed and upon receipt of the first of three equal payments.
  
     
  Phase 
    Milestone 
    Amount 
  
     
  1 
    SOW and Contract Execution 
    1/3 payment  
  
     
  2 
    First Assessment Interview 
    1/3 payment 
  
     
3 
    Delivery of Draft Report 
    1/3 payment 
  
Next Steps
Assessment Options
Custom assessments may be conducted based on the needs of the client. Here are examples:
| Assessments | |||
| Application Security | Vendors and Service Providers | Cybersecurity Program | Ransomware | 
| Business Process Risk | Incident Response | Line of Business Risk | FMEA Process Risk | 
| Security Operations Center (SOC) | Fraud Prevention | Insider Threat | Security Awareness Program | 
| Mergers and Acquisitions | Infrastructure Security | Zero Trust Security Model | Threat Landscape and Controls | 
| Cyber Exercise Program | Penetration Test Program | Cybersecurity Function | Agile Security Testing |