This service evaluates a function or team within your cybersecurity program. The foundation of each assessment is based on reputable practices such as a NIST 800 series document. Remaining testing procedures are developed by Gideon Rasmussen based on 20+ years of cybersecurity experience within corporate and military organizations.
This is a customized service based on the needs of the client. Examples of completed assessments include:
Program architecture is evaluated within the scope of each assessment:
Fees and Payment
The assessment is billed at a flat rate. The engagement begins once the Statement of Work and Contract are signed and upon receipt of the first of three equal payments.
Phase
Milestone
Amount
1
SOW and Contract Execution
1/3 payment
2
First Assessment Interview
1/3 payment
3
Delivery of Draft Report
1/3 payment
Next Steps
Assessment Options
Custom assessments may be conducted based on the needs of the client. Here are examples:
Assessments | |||
Application Security | Vendors and Service Providers | Cybersecurity Program | Ransomware |
Business Process Risk | Incident Response | Line of Business Risk | FMEA Process Risk |
Security Operations Center (SOC) | Fraud Prevention | Insider Threat | Security Awareness Program |
Mergers and Acquisitions | Infrastructure Security | Zero Trust Security Model | Threat Landscape and Controls |
Cyber Exercise Program | Penetration Test Program | Cybersecurity Function | Agile Security Testing |