Enter the organization name and your email address. Both fields are required to continue.
Select one range - Scale factor for internal user base & potential insider risk
Helps determine the scale of IT infrastructure and security needs based on user volume.

Indicates available resources for cybersecurity investments and helps assess risk appetite.

Reveals the complexity of your technology landscape and potential attack surface.

Identifies mandatory security controls and compliance requirements that must be implemented.

Determines industry-specific threats, regulations, and security best practices applicable to your business.

Measures the potential business impact of IT disruptions and helps prioritize security investments.

Assesses the potential impact of data breaches and determines required security controls.

Subjective rating of the value and impact of the data your organization processes.

Indicates the strategic importance of intellectual property to your organization.

Evaluates remote access security requirements and potential exposure to external threats.

Assesses supply chain risk and the need for vendor security management.

Determines the need for secure development practices and application security measures.

Determines specific cybersecurity controls.

Click Next if you want to provide more details. Each question is optional.

Helps understand the complexity and vulnerability points in your technical environment.

Determines exposure to different cybersecurity regulations.

Assesses potential impact of data breaches.

Defines data protection requirements.

Indicates the variety of systems requiring protection.

Assesses third-party cybersecurity risks.

Evaluates cybersecurity needs based on IP ownership.

Identifies compliance frameworks.

Evaluates potential for cascade failures.

Higher change rates can increase risk and require more robust change management.

Helps prioritize security controls and monitoring based on likely threats.