Cybersecurity Maturity Assessments

Your company’s assets, infrastructure and applications need to be protected. The only way to ensure they are secure is to test the systems you have in place. SubRosa’s Cybersecurity Maturity Assessments can do that for you.

SubRosa’s Cybersecurity Maturity Assessment leverages industry-standard risk and compliance frameworks to protect critical assets, applications and infrastructure. In order to assess your organization’s information security, SubRosa’s team will utilize its extensive experience to collect and review data from your organization. The team will analyze the information collected and conduct interviews, and then communicate recommendations to better secure your information. SubRosa will also lay out a plan to enable its recommendations to be effectively implemented.

Gain a holistic view of your organization’s people, processes and technological cybersecurity maturity through both technical and procedural testing and investigation.

    What the Service Includes

    Cybersecurity Maturity Assessment Methodology

    All Cybersecurity Maturity Assessments are conducted by teams of at least 2 assessors. “slim” assessments are available with less, although we typically reserve this service for smaller/self-assessing Clients. The SubRosa Cybersecurity Maturity Assessment is conducted in 4 phases:

    1. An onsite assessment of evidence gathering, interviews and Q&A with the appropriate teams. (COVID-19 permitting).
    2. Video and phone calls to validate and verify information gathered in step 1. This step may replace step 1 if teams are unable to travel onsite.
    3. Technical assessments: network assessments and threat and vulnerability validation.
    4. Information collation and report writing.

    Read The Blog on How COVID-19 is Impacting Cybersecurity:

      Our Supported Cybersecurity Frameworks

      As a part of a standard Cybersecurity Maturity Assessment, SubRosa Cyber Solutions will benchmark your organization against the Center for Internet Security (CIS) Top 20 Critical Security Controls. This is an excellent baseline for organization’s wishing to know their cybersecurity maturity. However, some organization’s may have industry-specific cybersecurity requirements, such as finance or healthcare. As such, SubRosa Cyber Solutions specializes in a number of different frameworks, including but not limited to:

      NIST logo

      NIST Frameworks

      (CSF, 800-53, 800-171)

      iso-logo

      ISO 27001

      hipaa logo

      HIPAA

      hitrust-logo

      Hitrust

      sox-logo

      Sarbanes-Oxley

      Get Started with SubRosa Cyber Solutions