Cyber Security AssesmentPhase 1 – Penetration Testing

Phase 2 – Internal Security Audit

Phase 3 – Post Assessment Phase

Phase 4 – Recommendations & Training

The Post Assessment Phase is conducted on‐site and off‐site over a period of weeks (depending on the network size and requirements) from the conclusion of Vulnerability Analysis (On‐site) Phase and includes:

  • Complete final assessment report.
  • Program enhancement recommendations.
  • Priority items requiring immediate attention identified with recommendations