Cybersecurity Situation - our extensive check
The analysis area of our Cybersecurity Check
With our compact analysis, you quickly obtain a comprehensive view of your security level and thus an up-to-date situation picture. All relevant areas for you are taken into account. As a result of the cybersecurity check, you receive an individual assessment as a starting point for improving your security level.
Procedure model and project flow of the Cyber Security Check
The establishment of the cybersecurity situation consists of three phases. The kick-off and project planning form the start of the project. In the following phase, interviews and tool-supported, technical analyses are carried out. The third phase concludes the preparation of the situation report. secunet presents the final report to the management and offers the opportunity to discuss identified recommendations for action.
In the context of the Cybersecurity Check, secunet uses a standardised and proven procedure model to create the situation picture, thus ensuring high quality and comparability. The analysis is carried out by an interdisciplinary team of experts. Architects, auditors, lawyers, penetration testers and IT and OT engineers work hand in hand.
Phase 1: Selection of the analysis areas for the Cybersecurity Check
The selection of analysis areas is crucial for a comprehensive and high-quality situation picture.
Therefore, a kick-off meeting and detailed planning take place at the beginning. Subsequently, in this first phase, the areas relevant to you are specified and, if necessary, individual focal points are set.
Phase 2: Interviews and analyses
The second phase of the cyber security check involves the concrete collection of relevant data. secunet is characterised by a unique combination of assessments, tool-based analyses and penetration tests. Thus, a significantly higher degree of commitment and accuracy is achieved than with analyses commonly used in the market.
In addition to the included penetration tests, further technical analyses can be carried out, e.g. crypto situation picture, network situation picture incl. asset discovery and anomaly detection, password security situation picture.
Phase 3: Completion of the cybersecurity situation
In the final phase, the previously collected data is evaluated in order to be able to make appropriate recommendations for action. The final report of our Cybersecurity Check brings together the results of the individual analyses and assessments.
The analyses are each supplemented with proposals for measures to reduce or avoid the weaknesses and risks identified. secunet presents the final report and provides further scope for discussion and decision-making tools.
Send us an inquiry via the contact form. We are happy to help.