How Do You Conduct a Thorough Cybersecurity Assessment?

Whether you are using an internal department or an external firm, conducting a thorough cybersecurity assessment starts with identifying the cybersecurity framework or frameworks that are applicable.

Key Takeaways

  • Document your organization’s security policies and procedures.
  • Collect evidence showing adherence to your policies and procedures.
  • Create an action plan to address issues found during the assessment.
  • Prioritize fixing the controls that have the largest impact first.

Meet Our Speaker

David Resler, Director of Information Security, Knowledge Services

David brings over 30 years of IT expertise, with nearly two decades focused on information security. For the past 17 years, he’s been dedicated to enhancing cybersecurity in the public sector. His deep understanding of the unique challenges faced by public institutions makes him a valuable asset in protecting critical information and infrastructure.