How your FREE Risk Assessment works

We’ve kept the process simple so you can get value quickly – with no disruption to your team.

Step 1


Fill out your Intake form

Fill out our short 10-15 minute intake form so we can prepare in advance.


Step 2


Meet with our consultant

Join a 20–30 minute call to walk through how you operate and how you’re currently protecting your organization.



Step 3


Review your risk snapshot

Receive your summarized findings, top risks, and recommended next steps, including options for a full Cyber Security Audit if it makes sense.



Cyber Risk Assessment Intake Questionnaire

SECTION 1 – ORGANIZATION PROFILE

SECTION 2 - IT OWNERSHIP & SUPPORT

SECTION 3 – CRITICAL SYSTEMS AND DATA

SECTION 4 – CURRENT SECURITY PRACTICES (High Level)

Identity & Access

Email & Endpoints

Backups & Recovery

Network & Remote Access

Governance, Policies & Training


SECTION 5 – INCIDENTS, INSURANCE & PRIORITIES

IF YES to previous question


SECTION 6 – WHAT MATTERS MOST RIGHT NOW



SECTION 7 – SCHEDULING & CONSENT