Ransomware Risk Assessment

 

Our Ransomware Risk Assessment evaluates program activities and documentation to identify areas for improvement.

The foundation of the assessment are documents and advisories from reputable sources such as the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST). Remaining practices have been developed by Gideon Rasmussen based on 20+ years of cybersecurity experience within corporate and military organizations.

Areas of focus include:

  • Allowlist Software
  • Anonymization Services
  • Anti-Malware Software
  • Awareness Training
  • Backup and Recovery Test
  • Command & Control Servers
  • Critical Service Providers
  • Data Leak Protection
  • Email Security Gateway
  • Granular Firewall Rules
  • Least Privilege
  • Multi-Factor Authentication
  • Network Segmentation
  • Offline Backups
  • Patch Management Program
  • Phishing Test Messages
  • Ransomware Response Plan
  • Web Content Filter
Assessment activities consist of: [1] documentation and artifact review, [2] evaluation of in-place controls and [3] interviews with IT and Information Security personnel. The assessment is conducted by phone and screen share.

Deliverables include an assessment report and a slide deck presented to executive leadership.

Ransomware is a significant threat. Adversaries first exfiltrate sensitive data for ransom. Next, they deploy ransomware to encrypt files rendering data and systems unavailable. Having backups stored offline is not sufficient. It is necessary to design controls, plan response and exercise in the event of a ransomware outbreak. Accordingly, this service evaluates controls across several areas of focus as detailed above.

Fees and Payment

The assessment is billed at a flat rate. The engagement begins once the Statement of Work and Contract are signed and upon receipt of the first of three equal payments.

Phase Milestone Amount
1 SOW and Contract Execution 1/3 payment
2 First Assessment Interview 1/3 payment
3 Delivery of Draft Report 1/3 payment

Next Steps

Each engagement can be customized to meet the needs of the client. The first step in the process is to have a conference call to discuss requirements.

Assessment Options

Custom assessments may be conducted based on the needs of the client. Here are examples:

Assessments
Application Security Vendors and Service Providers Cybersecurity Risk Cyber Exercise Program
Business Process Risk Incident Response Line of Business Risk FMEA Process Risk
Security Operations Center (SOC) Fraud Prevention Insider Threat Security Awareness Program
Mergers and Acquisitions Infrastructure Security Zero Trust Security Model Threat Landscape and Controls

This service offering description provides an overview for informational purposes only. The Statement of Work and the Master Services Agreement are the official documents for each assessment engagement.