Step 1: Engagement Data Collection
Our security experts work with key stakeholders for the assessment from selected members of your information security team and organisation. The assessment should require no more than half a day in an online session, to gather data from your team using ISF assessment tools.
Step 2: Assessment Results
The second online session will take no more than half a day to discuss the results. ISF experts will provide detailed analysis of your assessment scores, including comparison to the ISF benchmark database and ISF Members. This gives you the opportunity to recognise the impact of security weaknesses, understand how you compare against your peers and identify the key areas where prioritised action will have the greatest effect.
Step 3: Expert Review
The assessment is followed up with an online ISF Expert review based on Member experience and example. It includes recommendations for the use of additional ISF resources, tools and peer communities to accelerate improvement of your security in identified areas. Linked to your Rapid Security Assessment, it highlights areas where ISF resources can deliver long term, ongoing, information security improvement.
One of the best features is that we gain expert, independent insight of our strengths and weaknesses coupled with pragmatic guidance to address critical security weaknesses in our companyISF Member