Cyber security assessments
Having effective cyber security starts with understanding your cyber security risks.
Our Cyber Security Risk Assessment will give you an in depth understanding of your risk profile so you can make informed decisions about improving the level of cyber security. The Ignite Systems Cyber Security Risk Assessment involves an audit of a wide range of security mitigation measures consistent with the Ignite Systems Cyber Security Framework. It seeks to understand an organisation’s capacities and capabilities in performing, planning, managing, measuring, and defining cyber security practices and behaviours. |
The report will provide an organisation with a better understanding of the organisation’s cyber security posture, and will provide a number of benefits;
The report contains details for each of the mitigation measures, which are based on recognised standards or best practices. For each measure there is information about the rationale, implementation guidance, an assessment, and finally there is information about the action that Ignite recommends to address any identified shortcoming.
The report reflects an organisation’s capabilities only at the time of the assessment. An organisation cannot rely on the assessment results as a conclusive expression of the organisation’s cyber security capability in the future.
- An improved awareness of the need for effective cyber security management;
- A review of capabilities most important to ensuring the continuity of critical services during times of operational stress and crises;
- An assessment of cyber security governance;
- An identification of cyber security improvement areas; and
- A catalyst for further discussion and action to improve cyber security.
The report contains details for each of the mitigation measures, which are based on recognised standards or best practices. For each measure there is information about the rationale, implementation guidance, an assessment, and finally there is information about the action that Ignite recommends to address any identified shortcoming.
The report reflects an organisation’s capabilities only at the time of the assessment. An organisation cannot rely on the assessment results as a conclusive expression of the organisation’s cyber security capability in the future.