Risk Assessment

Service Profile

Performing a company-wide Information Technology Risk Assessment is a critical step in a successful Information Security Program. This process will help an institution identify all IT assets and determine the residual and inherent risk values for each.

During our extensive audit history 10-D Security has had the advantage of seeing the good, the bad and the ugly when it comes to Information Technology Risk Assessments. And that is exactly what we bring to the table. We have seen what works and what does not.

Risk Assessments are unique to each company. 10-D Security works with management and key personnel to ensure that the risk assessment is accurate and meets the organization's needs.

Our process for completing a comprehensive Risk Assessment involves a number of strategies including interviews with key personnel and review of the Information Security Program. The assignment of rating criteria including Information Sensitivity Classification, Criticality, Likelihood, and Impact of all known threats are used to calculate Inherent Risk of each asset. The controls are then reviewed allowing the assignment of Residual Risk.

Whether creating a Risk Assessment from scratch or updating an existing Risk Assessment we can help.

The Difference

The Client

This assessment is appropriate for organizations when the following apply:

The Scope

The scope of our Risk Assessment engagement is gauged on customer needs. The following areas are included with our Risk Assessment:

Please contact us for a quote or additional information at info@10dsecurity.com or 877-204-5769.