RESOURCES

Sample online cyber maturity assessment

Is your network sufficiently protected against cyber attacks?

D2 Cybersecurity’s Cyber Maturity Assessment services are specifically designed to help organizations discover potential network vulnerabilities. We begin by gathering information in the form of an investigative questionnaire, which provides our team with the insight needed to identify security flaws within a system. Based on this data, D2 offers risk management suggestions that will help establish a successful and holistic cybersecurity program.

If you’re interested in learning more about D2’s Cyber Maturity Assessment process, you can sign up to take a sample version of our questionnaire. The Sample Cyber Maturity Assessment questionnaire contains a small subset of the questions from our complete assessment, which addresses the 5 pillars of information security controls shown below:

Identify
The Identify Function assists in developing an organizational understanding of how to manage cybersecurity risks to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts consistent with its risk management strategy and business needs.

Protect
The Protect Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. This function also supports the ability to limit or contain the impact of a potential cybersecurity event.

Detect
The Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event. This function also enables timely discovery of cybersecurity events.

Respond
The Respond Function provides the appropriate actions to take regarding a detected cybersecurity incident. This function also supports the ability to contain the impact of a potential cybersecurity incident.

Recover
The Recover Function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. This function also supports timely recovery to normal operations in order to reduce the impact from a cybersecurity incident.

How the Cyber Maturity Assessment works:
• Fill out the form on this page.
• You will be redirected to the Sample Cyber Maturity Assessment page.
• Respond to each question.
• Click “Submit”.
• A member from our team will reach out to you, to discuss your results!

Sign up to try our free sample online cyber maturity assessment tool.