Our Ransomware Risk Assessment evaluates program activities and documentation to identify areas for improvement.
The foundation of the assessment are documents and advisories from reputable sources such as the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST). Remaining practices have been developed by Gideon Rasmussen based on 20+ years of cybersecurity experience within corporate and military organizations.
Areas of focus include:
Deliverables include an assessment report and a slide deck presented to executive leadership.
Ransomware is a significant threat. Adversaries first exfiltrate sensitive data for ransom. Next, they deploy ransomware to encrypt files rendering data and systems unavailable. Having backups stored offline is not sufficient. It is necessary to design controls, plan response and exercise in the event of a ransomware outbreak. Accordingly, this service evaluates controls across several areas of focus as detailed above.
Fees and Payment
The assessment is billed at a flat rate. The engagement begins once the Statement of Work and Contract are signed and upon receipt of the first of three equal payments.
Phase
Milestone
Amount
1
SOW and Contract Execution
1/3 payment
2
First Assessment Interview
1/3 payment
3
Delivery of Draft Report
1/3 payment
Next Steps
Assessment Options
Custom assessments may be conducted based on the needs of the client. Here are examples:
Assessments | |||
Application Security | Vendors and Service Providers | Cybersecurity Program | Ransomware |
Business Process Risk | Incident Response | Line of Business Risk | FMEA Process Risk |
Security Operations Center (SOC) | Fraud Prevention | Insider Threat | Security Awareness Program |
Mergers and Acquisitions | Infrastructure Security | Zero Trust Security Model | Threat Landscape and Controls |
Cyber Exercise Program | Penetration Test Program | Cybersecurity Function | Agile Security Testing |