We first engage with your business leaders to identify what exactly you need to achieve your business outcomes. Once we establish all business-critical elements, we align our questions to support your desired outcomes.
Secon’s team then engages with IT security personnel to measure exactly how much visibility and control you have to protect, detect, and recover from a cyber attack. We ask the right questions that get to the heart of how well you’re currently protecting your data.
- Protect – How well protected is your data and operations against cyber criminals?
- Detect – Cyber criminals are known to circumvent protection. How well equipped are you to spot a cyber criminal that has found a way into your environment?
- Recover – How easily could your organisation recover from a cyber attack or related system failure?
Using the data gathered during the exercise, we build our Cyber Risk Assessment report.