Risk Assessment

Risk Assessment

Vulnerability Assessment

The first step in securing your network is to assess areas of possible risk and predict the impact of successful cyber-attack. Cytelics can help test your systems and applications and perform an information security risk assessment of your security programs. From this analysis, we identify gaps in your technology environment that create risk, and help you construct a stronger security posture that you can rely on for protection and the satisfaction of compliance requirements.

Network Vulnerability Assessment

Network Vulnerability Assessment

  • Team deployed to customer location
  • Cytelics Certified Laboratory used to replicate customer environment
  • Customer training on industry best practices

Risk Assessment

  • Industry-specific assessment of business risk
  • Economic impact analysis of cyber-attack
  • Economic impact analysis on absence of action

The Risk Assessment service commences with a pre-assessment of the target site. Analysis of existing site documentation facilitates modeling of the subject network and testing of assessment tools and procedures prior to deployment. The information security risk assessment is focused on capturing network data, system configurations, software information, and operational activity. The post-network vulnerability assessment phase is the culmination of the Risk Assessment. All collected data is analyzed for attack trends, security anomalies, and deviation from industry best practices. A detailed report of the assessment and results is provided to the customer.

Our risk assessment include:

  • Pre-assessment:
    • Define scope of assessment
    • Establish data protection procedures
    • Collect existing site documentation
    • Identify and rank critical assets
  • Assessment:
    • Analyze network architecture
    • Device discovery
    • Assess threat environment
    • Penetration testing
    • Assess physical security
    • Perform physical asset analysis
    • Assess operational security
    • Examine policies and procedures
  • Post-assessment:
    • Analyze capture data, device configurations, software and hardware information
    • Updated site documentation
    • Develop risk assessment report and lessons learned
    • Prioritize recommendations
    • Conduct training

Need More Information?

Contact your nearest Globecomm office.