01
Identity & Access Management (IAM)
+ click to learn more
Identity & Access Management (IAM) Security Self-Assessment — A structured review that evaluates how identities, roles, and access privileges are managed to ensure only authorized users and systems can access critical resources, reducing the risk of unauthorized access and privilege misuse.
02
Security Architecture & Engineering
+ click to learn more
Security Architecture & Engineering Self-Assessment — A structured review that evaluates the design and implementation of an organization’s security architecture and engineering practices to ensure systems are securely designed, integrated, and resilient against cyber threats.
03
Network Security
+ click to learn more
Network Security Self-Assessment — A structured review that evaluates the effectiveness of network security controls such as firewalls, segmentation, monitoring, and access restrictions to protect systems and data from unauthorized access and cyber threats.
04
Governance, Risk & Compliance (GRC)
+ click to learn more
Governance, Risk & Compliance (GRC) Self-Assessment — A structured review that evaluates an organization’s governance structure, risk management processes, and compliance practices to ensure risks are effectively managed and regulatory requirements are met.
05
Endpoint & Device Security
+ click to learn more
Endpoint & Device Security Self-Assessment — A structured review that evaluates the security controls protecting endpoints such as laptops, servers, and mobile devices, including configuration, patch management, malware protection, and device access controls.
06
Application Security (AppSec)
+ click to learn more
Application Security (AppSec) Self-Assessment — A structured review that evaluates the security of applications across the development lifecycle, including secure coding, vulnerability management, testing, and protection against common threats such as injection, authentication flaws, and data exposure.
07
Cloud & Infrastructure Security
+ click to learn more
Cloud & Infrastructure Security Self-Assessment — A structured review that evaluates the security of cloud platforms and underlying infrastructure, including configuration management, network protection, identity controls, and monitoring to ensure systems and data are securely hosted and managed.
08
Data Security & Privacy
+ click to learn more
Data Security & Privacy Self-Assessment — A structured review that evaluates how sensitive data is protected, managed, and processed to ensure confidentiality, integrity, privacy compliance, and protection against unauthorized access or data breaches.
09
Security Operations (SOC & Monitoring)
+ click to learn more
Security Operations (SOC & Monitoring) Self-Assessment — A structured review that evaluates the effectiveness of security monitoring, threat detection, incident response, and logging capabilities to ensure timely identification and response to cybersecurity threats.
10
Threat & Vulnerability Management (TVM)
+ click to learn more
Threat & Vulnerability Management (TVM) Self-Assessment — A structured review that evaluates how an organization identifies, assesses, prioritizes, and remediates security vulnerabilities and emerging threats to reduce the risk of exploitation.
11
Incident Response & Digital Forensics
+ click to learn more
Incident Response & Digital Forensics Self-Assessment — A structured review that evaluates an organization’s ability to detect, respond to, investigate, and recover from cybersecurity incidents while preserving evidence for forensic analysis.
12
Business Continuity & Disaster Recovery (BC/DR)
+ click to learn more
Business Continuity & Disaster Recovery (BC/DR) Self-Assessment — A structured review that evaluates an organization’s preparedness to maintain critical operations and recover systems and data during disruptions, ensuring resilience and minimal business impact.
13
Third-Party & Supply Chain Security
+ click to learn more
Third-Party & Supply Chain Security Self-Assessment — A structured review that evaluates how an organization manages security risks arising from vendors, partners, and suppliers to ensure external dependencies do not introduce unacceptable cyber or operational risks.
14
Awareness, Training & Security Culture
+ click to learn more
Awareness, Training & Security Culture Self-Assessment — A structured review that evaluates the effectiveness of security awareness programs, training initiatives, and organizational culture in promoting secure behaviors and reducing human-related cyber risks.
15
OT / IoT & Critical Infrastructure Security
+ click to learn more
O&T, IoT & Critical Infrastructure Security
Operational Technology (OT), Internet of Things (IoT), and critical infrastructure environment
16
AI, Automation & Emerging Technology Security
+ click to learn more
As organizations adopt AI, automation, and emerging technologies, new and often hidden security risks.
17
Wireless and Wi-Fi Security
+ click to learn more
Wireless and Wi-Fi Security Self-Assessment — A structured review that evaluates the security of wireless networks, including encryption, authentication, access controls, and monitoring to prevent unauthorized access and wireless-based attacks.
18
ISO 27001
+ click to learn more
ISO 27001 Self-Assessment — A structured review conducted by an organization to evaluate its alignment with ISO/IEC 27001 information security requirements, identifying gaps in policies, controls, and processes within its Information Security Management System (ISMS).
19
ISO 22301
+ click to learn more
ISO 22301 Self-Assessment — A structured review that enables an organization to evaluate its business continuity management practices against the requirements of ISO 22301, identifying gaps, risks, and areas for improvement to ensure operational resilience and continuity during disruptions.
20
SOC 2
+ click to learn more
SOC 2 Self-Assessment — A structured evaluation that allows an organization to measure its security, availability, processing integrity, confidentiality, and privacy controls against the SOC 2 Trust Services Criteria to identify gaps and strengthen compliance readiness.
21
DORA
+ click to learn more
DORA Self-Assessment — A structured review that helps financial institutions evaluate their ICT risk management, operational resilience, incident reporting, third-party risk, and testing practices against the requirements of the EU Digital Operational Resilience Act (DORA) to identify gaps and improve compliance readiness.
22
FCA PS21/3
+ click to learn more
FCA PS21/3 Self-Assessment — A structured review that enables firms to evaluate their operational resilience framework, including important business services, impact tolerances, and mapping of dependencies, against the requirements of Financial Conduct Authority Policy Statement PS21/3 to identify gaps and strengthen resilience compliance.
23
NIST FSP
+ click to learn more
NIST Framework Self-Assessment — A structured review that helps an organization evaluate its cybersecurity practices against the National Institute of Standards and Technology Cybersecurity Framework
24
CBEST
+ click to learn more
CBEST Self-Assessment — A structured review that helps financial institutions evaluate their cyber resilience, threat intelligence capability, and security controls against the UK financial sector’s intelligence-led testing framework developed by the Bank of England and the Financial Conduct Authority.
25
NIST 800-53
+ click to learn more
NIST SP 800-53 Self-Assessment — A structured review that enables an organization to evaluate its security and privacy controls against the control catalogue defined in NIST Special Publication 800-53 by the National Institute of Standards and Technology to identify control gaps and improve cybersecurity posture.
26
CSA Cloud Control Matrix
+ click to learn more
CSA Self-Assessment — A structured review that helps organizations evaluate their cloud security controls against the Cloud Controls Matrix developed by the Cloud Security Alliance to identify security gaps and improve cloud governance and compliance readiness.
27
AWS Security
+ click to learn more
AWS Security Self-Assessment — A structured review that helps organizations evaluate the configuration and security controls of their workloads running on Amazon Web Services to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.
28
GCP Security
+ click to learn more
GCP Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Google Cloud Platform to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.
29
Azure Security
+ click to learn more
Azure Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Microsoft Azure to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.
30
GDPR
+ click to learn more
GDPR Self-Assessment — A structured review that helps organizations evaluate their data protection practices and privacy controls against the requirements of the General Data Protection Regulation to identify compliance gaps and strengthen personal data protection.
No domains match your search.