.png)
The organization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored
The organization's current cybersecurity risks are understood
Safeguards to manage the organization's cybersecurity risks are used
Possible cybersecurity attacks and compromises are found and analyzed
Actions regarding a detected cybersecurity incident are taken
Assets and operations affected by a cybersecurity incident are restored
1. This is a 'light', abridged version of cybersecurity assessment based on the NIST CSF 2.0.
2. You need to select either one or multiple responses from the multiple choice questions.
3. Most questions will have three options: Yes, Partial, or No.
4. Scoring is based on a 5-point tier:
5. After completion, you will receive an assessment report with executive summary, scores, and detailed analysis.
6. Please provide additional details in the comment boxes to help us understand your current processes and challenges.
Disclaimer: This assessment does not guarantee the detection of all existing or potential vulnerabilities, threats, or exploits. It reflects the organization's security posture at the time of testing solely based on your responses to the assessment questions. The assessment report is intended solely for your internal use and must not be distributed, disclosed, or relied upon by third parties. RSM shall not be liable for any losses, damages, claims, or expenses arising from, or in connection with, the use of the assessment results.
By clicking "Begin Assessment", you agree to our privacy policy and terms and conditions.