Cybersecurity Risk Assessments
Understand How Your Cybersecurity and Information Risk Program Functions Today
Risk assessments are the foundation of a strong cybersecurity strategy, helping organizations identify vulnerabilities before attackers do. They provide a clear view of where your greatest risks lie, allowing you to prioritize resources and defenses effectively. By proactively evaluating threats, you reduce the likelihood of costly breaches and ensure compliance with industry regulations. Risk assessments turn uncertainty into informed action - protecting your data, operations, and reputation.
Cybersecurity and Control Risk Assessments
Cybersecurity assessments are essential tools for understanding and strengthening your organization's security posture. These assessments typically fall into two key categories: (i) cybersecurity risk assessments and (ii) cybersecurity controls assessments. While both are interconnected, each serves a distinct purpose - one identifies what is important to you and where your vulnerabilities lie, and the other evaluates how well your defenses are working. Together, they provide a comprehensive view of your organization's ability to prevent, detect, and respond to cyber threats.
Risk Assessment
Sign Up Today
Assessment Methodology
BorderHawk Methodology
The objective of the BorderHawk Methodology is to develop a consistent conclusion regarding the risk to confidentiality, integrity, and availability of information created, received, stored, or transmitted by the organization.
We use the following definitions for confidentiality, availability, and integrity:
- Confidentiality - the circumstances whereby data or information is made available or disclosed to unauthorized persons or processes.
- Integrity - the circumstances whereby data or information has not been altered or destroyed in an unauthorized manner.
- Availability - the circumstances whereby data or information is accessible and usable upon demand by an authorized person.
Based on our collective experience, we utilize a qualitative approach for assessing information risk. The qualitative method uses specific language to describe information risk - an activity or lack of activity associated with information management scored on a scale of 1-10 and described as either a low risk, medium risk, or high risk. We have found this approach to be most effective in rapidly developing corresponding mitigation plans.
Our intent is to maximize results through;
- Examination of Specific Key Criteria - Key criteria are identified for application of the Information Risk Assessment control and examined for impact to People, Processes, Technology, and Facilities.
- Determination of Practice - Interviews are structured to gain a complete understanding of current operational practices and to evaluate the familiarity and consistency of application.
- Results Reporting - Results are reported based on defined criteria and color-coded describing compliance risk associated with each control.
Our methodology employs a probing technique for framing and analyzing the subject matter associated with each area of risk inquiry. The approach is known as IRAC. IRAC is an acronym for Issue - Rule - Analysis - Conclusion.
The process for assessing each Information Security Management Control Area, and its subcomponents, are as follows;
- Identify the Control purpose, State it as an Issue and then inquire about the organization's efforts within the control area through a series of questions.
- With reference to the Rule (the pertinent regulation or standard's control requirements), perform an Analysis for compliance of the organization's activities with respect to that rule.
- Use the Conclusion derived by that analysis to drive understanding risk.
Accordingly, this assessment uses the following collection techniques;
- Collecting documented policies, processes, procedures, in soft or hard copy, for review.
- Interviewing knowledge and available staff members.
- Observing while onsite.
- Use the Conclusion derived by that analysis to drive understanding risk.
In analyzing each answer, we consider the presence of expected information security management controls;
- Has the organization implemented a specific control or does some other mitigating factor assist in providing an adequate protective measure?
- The answer to each of these questions will essentially by a yes or a no.
- Does the implemented control appear to provide a necessary protective measure (quality)?
The BorderHawk Process
The BorderHawk process for assessments, from document collection, through interviews, to final reporting, takes approximately 6-8 weeks. Our process consists of 10 activities including;
1 |
Scoping |
2 |
Document Collection |
3 |
Initial Interviews |
4 |
Physical Walk-Through |
5 |
Onsite Interviews |
6 |
Analysis |
7 |
Secondary Interviews |
8 |
Reporting |
9 |
Initial Findings Review |
10 |
Final Report Review |