Threat Risk Assessment
This is a 2-3 week engagement to analyze your network operating systems and applications for vulnerabilities, examine potential threats associated with those vulnerabilities, and evaluate the resulting security risks.
The level of threat is determined from the potential for any natural, human or environmental source to trigger or exploit any identified vulnerability.
The risk assessment looks at both the probability of that threat occurring, and the impact on both system and organization should it occur.
The deliverable is both a technical as well as an executive document and presentation detailing your current Threat/Risk profile across your infrastructure. Where vulnerabilities have been identified, we will provide a list of remediation options: quick wins, short term goals, and investments required - placed on a potential roadmap.