1-800-917-5719

Security Risk Assessments

Security risk assessments that add value.

If you’re looking for a security risk assessment, our comprehensive approach ensures you have complete list of security risks that are easy to understand.

Our Approach

Our approach to assessing risk follows industry frameworks accepted by common compliance bodies such as Health Insurance Portability and Accountability Act) HIPAA Office of Civil Rights (OCR), Payment Card Industry (PCI) Security Standards Council (SSC), and the Center for Medicare & Medicaid Services (CMS).  Our approach is outlined below:

Security Assessment Preparation

The first step is always preparing.  This step ensures context for the security risk assessment.  Our preparation usually begins very early in our relationship and includes:

  • Purpose of the assessment
  • Scope of the assessment
  • Uncovers any assumptions or constraints
  • Any potential inputs or factors to consider while conducting the assessment
  • Identify the analytic approach

Conducting Security Risk Assessments

The outcome of this step is to provide you with a list of security risks that can be prioritized and used to inform a meaningful risk response.  Completing a risk assessment has many steps and tasks.  Those tasks in summary are:

  • Identify security threat sources that are relevant to your organization or industry
  • Identify threat events that might come from the threat sources
  • Identify security vulnerabilities in your organization that could be exploited by threat sources
  • Determination likelihood that threat sources would initiate specific threat events
  • Determination of impact to the organization resulting from the exploitation of security vulnerabilities
  • Determination of actual security risk as a combination of likelihood of vulnerability exploitation and impact of exploitation

Security Risk Assessment Reporting

At the conclusion of the security risk assessment we report on the results of the risk assessment and ensure that you can understand the results.  Our goal is ensure that decision makers have the appropriate risk-related information needed to inform and guide risk decisions.  In addition to preparing a report, based on the organizational communication style we can also prepare executive briefings, prepare risk memos, or risk dashboards.

Recent Blog Posts

What is NIST 800-171 for DFARS?

Author: Kristof Holm I often hear feedback from clients that National Institute of Standards and Technology (NIST) frameworks are too cumbersome and frustrating to implement, with a steep learning curve to understand all the requirements. I can empathize with them,...

Why Your Company Needs Third-Party Vendor Management Services

By: Paul Dusini We’ve all heard about data breach horror stories like Target’s staggering leak of 40 million customer credit and debit card accounts or Home Depot’s stolen 56 million payment card accounts. Considering the significant damage to a brand’s reputation and...

NIST Cybersecurity Framework (NCF) Version 1.1 Changes

Author: Kristof Holm With recent updates to the NIST Cybersecurity Framework (CSF), now seems good a time as any to revisit the framework, highlight some of the advantages to leveraging it and discuss what these changes may mean going forward. NIST Cybersecurity...

Got Security Risk?

Pin It on Pinterest