The Cybersecurity Assessment includes:
- Full, detailed findings report
- Executive summary and prioritized recommendations
- Complete internal and external vulnerability assessment results.
- Initial scoping call and delivery of document intake list.
- Validation of internal and external network scan targets
- Shipment of scanner to client site for internal scans
- Client review of document intake list, Q&A.
- Onsite analyst engagement
- Draft report delivery, client review call.
- Finalize report
This engagement is typically completed within 90 days of client approval. We will work with you to set the schedule due dates.
Place your order and we’ll reach out to gather specifics from you and to provide a detailed statement of work for the engagement.