Cyber Risk Deep Dive
M&A Due Diligence | Risk Management Assessment | Pre-insurance Readiness
There are several situations in which you want to know exactly how the cyber security of a company is organized. This means that the entire IT and OT environments of an enterprise must be thoroughly screened. In addition to exploring the existence of cyber security measures, we also 'review' the operation of these measures; how effective are the measures in practice?
By effectively retrieving data that maps the digital landscape of the organization and the existence of (cyber security) measures, we can present the actual cyber risks crystal clear. Amongst other things, we use software which your IT department or IT provider can easily implement and this will give you an accurate picture of active malware, vulnerabilities in installed software, and so on. Additionally, you can count on the Cybermill Group for concrete, hands-on advice.
Average lead time: 10 working days
Including
- Check presence (existence) of cyber security measures, policies and administration
- Ransomware Assessment
- Map out digital attack surface
- Comprehensive check for presence of vulnerable software
- Map out 'shadow IT'; devices which are outside the management and visibility of the IT department
- Review of IT/OT architecture
- Review of 'Disaster Recovery' plan
- Pragmatic check against legal obligations and standards, like ISO 27001, NEN 7510 and NIS 2.0
- Clear report with findings and risks, including pragmatic, next steps advice