Professional Documents
Culture Documents
CLIENT
GANESH TECHNOLOGIES
Cyber Health
Methodology
TitanDef follows a simple methodology to evaluate inherent cyber risk to your organization (Inherent Risk Score) and subsequently
recommends a target maturity level to protect your environment from cyber threats. Gaps identified in security controls are prioritized
for remediation by measuring their impact and likelihood of potential losses. A detailed Plan of Action is created by assigning time
and resources to elevate your security posture.
Steps
Evaluation Report
Overall Risk —
Based on your overall inherent cyber risk, we recommend assessing security controls in Level 1 through 3 to
protect your IT environment from common cyber threats.
OVERVIEW
Based on Ganesh Technologies current cybersecurity measures view its probability of impact from the top 3 cyber
threats i.e. Ransomware, Malware and Phishing / Business Email Compromise.
In addition to its internal cybersecurity measures, Ganesh Technologies also follows a defined methodology for
managing third-party cyber risk. An inventory of all IT vendors/third parties is maintained, and periodic assessments are
prioritized based on the extent of cyber risk with each vendor and the results of prior vendor assessments. The
organization evaluates its data loss exposure by documenting the type and extent of data shared with each vendor. A
vendor exposure rating is calculated and assigned to all vendors. Further, local vendors are periodically sent a
standardized self- assessment cyber questionnaire. Based on the responses from the questionnaire, cybersecurity risk
ratings are assigned to each vendor.
The chart below shows the percentage of cyber controls completed within each of the 3 recommended levels (Baseline,
Intermediate and Defined) for Ganesh Technologies.
Cyber Maturity
Your organization has yet to achieve a Baseline level of cyber defense capabilities.
Showing a distribution of control attributes and your "Assess Cyber Controls" responses.
Kill Chain
Showing a distribution of your ‘Access Cyber Controls’ responses mapped to the cyber kill chain
DETAILED REPORT
Ganesh Technologies consistently follows best practices around these basic cyber hygiene controls
Ganesh Technologies mostly follows best practices around these basic cyber hygiene controls
Lack of an accurate hardware inventory deters identification of unauthorized devices on your network. Maintain an accurate
and up-to-date inventory of all physical technology assets.
CIS Controls v8
Overall you have completed 0% of all CIS library controls based on the mapping to TitanDef.
You have a 0% completion rate within Implementation Group 1, 0% within IG2 and 0% within IG3.
Implementation Group 1
Implementation Group 2
Implementation Group 3
Recommendations
Find a list of recommendations to improve your cyber security posture in order of priority below. Recommendations
provide a specific course of action and estimated timelines for completion.
Plan of Action
This chart shows the estimated remediation timeline by individual recommendation
Estimate Timeline
This chart shows a summarized count of security recommendations grouped by criticality and recommendation
timeframes
Recommendation
You can choose to mitigate the risk or accept it. Alternatively, make a detailed recommendation on risk mitigation by
providing a proposed remediation plan, estimated budget and estimated timeline.You can choose to mitigate the risk or
accept it. Alternatively, make a detailed recommendation on risk mitigation by providing a proposed remediation plan,
estimated budget and estimated timeline.