This service evaluates a function or team within your cybersecurity program. The foundation of each assessment is based on reputable practices such as a NIST 800 series document. Remaining testing procedures are developed by Gideon Rasmussen based on 20+ years of cybersecurity experience within corporate and military organizations.
This is a customized service based on the needs of the client. Examples of completed assessments include:
Program architecture is evaluated within the scope of each assessment:
Fees and Payment
The assessment is billed at a flat rate. The engagement begins once the Statement of Work and Contract are signed and upon receipt of the first of three equal payments.
SOW and Contract Execution
First Assessment Interview
Delivery of Draft Report
Custom assessments may be conducted based on the needs of the client. Here are examples:
|Application Security||Vendors and Service Providers||Cybersecurity Program||Ransomware|
|Business Process Risk||Incident Response||Line of Business Risk||FMEA Process Risk|
|Security Operations Center (SOC)||Fraud Prevention||Insider Threat||Security Awareness Program|
|Mergers and Acquisitions||Infrastructure Security||Zero Trust Security Model||Threat Landscape and Controls|
|Cyber Exercise Program||Penetration Test Program||Cybersecurity Function|