Comprehensive Cyber Security Assessment

Comprehensive Cyber Security Assessment

A Comprehensive Cyber Security Assessment (CCSA) studies the intersection between people, technology and (process) work, with the major aim to find areas where technology architecture and human requirements produce potential risks.

The Problem

Recent advances in technology and the pace at which technology is influencing our day to day lives has exponentially increased the ability to achieve process improvements while increasing the threat to a company’s security and critical infrastructure. 

Under pressure from performance and efficiency demands, security changes will be implemented while still expecting employees to achieve the same results with more involvement in security.  This disconnect has potentially negative repercussions on any new cyber security technology implementation.

Oversimplification Leads to a Technology Only Solution

The idea that new cyber security technology can be introduced as a simple substitution of what was happening before and preserving the process and achieving improved results is a costly oversimplification and perpetuates the substitution myth.  This is the reason that so many cyber security solutions from vendors and manufacturers have failed to produce the results they promised.  These companies have ignored years of research that show secure technology and process change is an intervention into an ongoing field of activity.

The Solution

A Comprehensive Cyber Security Assessment (CCSA). Studies have shown the intersection between people, technology and (process) work, uncover areas where technology architecture and human requirements produce potential risks. The CCSA relies on the knowledge base and corporate wisdom of your employees and an understanding of how technological change will affect the relationship between your employees, your company policies, human resources, training, and security metrics.

The CCSA will predict the repercussions that implementation of technology, change in process, and increased operational requirements will have on your employees, management, and the company’s security vulnerabilities.   The study’s findings, along with distributed desktop exercises, will identify how your employees deal with and adapt to complex scenarios, and are necessary before technology is implemented, so that changes can be made to ensure the level of security required and is achieved through cooperative human behavior, as well as technology to ensure success.