0% found this document useful (0 votes)
113 views

Cyber-Maturity-Assessment-Data-Sheet

Uploaded by

CrispySteven
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

Cyber-Maturity-Assessment-Data-Sheet

Uploaded by

CrispySteven
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Maturity Assessment

We always start with one simple question: what are you defending?

Challenge Organisations face many challenges to effectively protect


themselves from today’s cyber security threats. Organisations
must carefully and diligently assess the cyber risks posed to
its technology, systems and data assets; this assessment
should be as stringent as any other business risk it may face.
Organisations must also assess their obligations around their
regulatory and compliance settings.

Solution As part of the Cyber Maturity Assessment (CMA) we will use our experienced and
independently certified cyber security practitioners, to help analyse and evaluate
your cyber maturity. We use open, and recognised guidelines and standards so our
results are portable and comparable.

The CMA helps measure an organisation’s cyber defences and resilience by


checking their:
• Basic Hygiene – A check of effective protective measures that prevent most
cyber-attacks. Using the UK government-backed Cyber Essentials scheme we
check that you have basic cyber security protections in place.
• Security Outcomes - Using the internationally recognised NIST Cybersecurity
Framework we assess your ability to achieve the outcomes of 23 core
categories.
• Vendor Ecosystem – What protective security measures and technology do you
have in place? We make an assessment and then model these measures against
a Cyber Defence Matrix. This shows how the layers of your security controls are
building defence in depth. This may be used to identify areas where there are
overlaps or indeed where gaps in defence exist.
• Continual Improvement (optional) - Managing risk is a process of constant
change and improvement. We work with C-level staff and board members
— over longer periods of time to deliver real and measurable outcomes and
improvements, rather than one-off deliverables.

As well as one-off point in time engagements our consultants can help you for the
long-term and you can grow into recurring assessments on a quarterly, bi-annual or
annual basis. The team can also offer training and guidance for your security staff
and projects.

TALION.NET e. [email protected] t. +44 (0) 800 048 5775


Cyber Maturity Assessment

Deliverables Our Cyber Maturity Assessment report Vendor Ecosystem


that includes: • Summary graphic of your security
Basic Hygiene check technologies.
• Five key protections related to Cyber • Mapped by NIST Cybersecurity
Essentials. Framework function (Identify to
Security Outcomes assessment Recover).

• Maturity by which 23 core cyber • Mapped by layer of defence in depth


security outcomes are achieved. (Users to Data).

• Aligns to NIST Cybersecurity An executive summary presents our


Framework - so you have the option findings, any priority activities, and
to build on as part of your security recommended areas for improvement.
programme.

At Talion, we’re changing the way organisations interact with their Managed HQ
About Talion Security Service Provider. Born out of BAE Systems, our service is built on The Hub, Fowler Avenue
first-hand knowledge of military engineering and defence-grade security, Farnborough GU14 7JF
together with an in-depth understanding of the threat landscape facing the Security Operations
commercial world today. Centre
Marshall’s Mill
When it comes to cyber security, we believe every organisation deserves Marshall Street
full visibility and complete control over how threats are monitored, how Leeds LS11 9YJ
decisions are made, and how their business is protected. That’s why
Engineering Centre
we prioritise transparency and collaboration across our service lines,
Unit 32-01, Level 32
implementing security programs that give businesses the control and
The Vertical Corporate Office
freedom to pursue ambitions and realise goals, safe in the knowledge that Tower B, Avenue 10
we’ve got their back, 24 hours a day, 7 days a week. Bangsar South, No 8
Copyright ©️2021 SY4 Security Limited trading as Talion. Jalan Kerinchi, 59200
All rights reserved. Kuala Lumpur, Malaysia

TALION.NET e. [email protected] t. +44 (0) 800 048 5775

You might also like