
We work closely with you to define specific objectives for your assessment.

Assessment Discovery
-
Discovery Checklist
-
Identify subject matter experts
-
Identify existing information
-
Plan interview schedule
-
Schedule interviews

Evaluation
-
Interview designated personnel on existing controls and functions
-
Review existing program as documented and implemented
-
Determine System Characterization
-
Conduct Threat Identification
-
Conduct Vulnerability Identification
-
Identify existing controls and effectiveness uilizing the CIS CSC and NIST CSF
-
Examine each control's stated function and requirements
-
Conduct Likelihood Determination and Impact Analysis
-
Identify desired state for the organization
-
Map to the overall framework/standard/guideline identified
-
Perform overall gap analysis

Report & Recommend
-
Classify Findings
- Risk rank the identified controls and program weaknesses
- Map to the overall security framework/standard -
Executive Summary Report
- Executive summary
- Key findings
- Security roadmap -
Control Assessment Matrix spreadsheet
- Detailed control review
- Graphical presentation of current security posture
- Remediation guidance; technical and services-based
- Prioritized near-term recommendation summary -
Next Steps and Recommendations
![map [Converted]_edited_edited_edited.png](https://static.wixstatic.com/media/f2abbc_d784ccb4b7884c5e9d70f64d58d31024~mv2.png/v1/fill/w_391,h_277,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/f2abbc_d784ccb4b7884c5e9d70f64d58d31024~mv2.png)
Why Choose Us?
Relify Security is focused on developing long-term relationships with our clients. Our team of innovative security specialists is committed to providing you with critical, data-driven information to help you make educated security decisions for your organization.