3rd Party Data Breach

Cyber Risk Scorecard 

Immediate insight into your network security posture

Cyber Security Risk Assessment
Fill out my online form
Powered By Normshield – the industry’s leading third-party cyber risk assessment and monitoring

The Methodology


Cyber Risk Scorecard uses Open Source Intelligence services to collect, analyze and report security related events and findings. Security companies and hackers are always scanning publicly accessible networks and share their data on the internet. This commonly referred to as Open-Source Intelligence (OSINT).Following mindmap shows how hackers can leverage their attack vectors by using OSINT services like hacker forums, social networks, Google, leaked database dumps, paste sites or even legitimite security services like VirusTotal, Censys, Cymon, Google Safe Browsing etc.

Easy to Understand Grading System and Report Delivery

Our grading methodology is based on Cyber Threat Susceptibility Assessment (CTSA). CTSA is a methodology for evaluating the susceptibility of a system to cyber-attack developed by MITRE. CTSA quantitatively assesses a system’s [in]ability to resist cyber-attack over a range of cataloged attack Tactics, Techniques, and Procedures (TTPs).

gradinga

Techimon has analyzed data in different risk categories from 1,000,000 servers for hundreds of companies and calculated letter grades. For example, a grade of ‘B’ indicates an organization has opened the door to a sophisticated hacker, a grade of ‘F’ means hackers of all types are being invited in. The overall grade of cyber risk scorecard shows “how easy is it to hack the corresponding environment.”


If you need additional info, please contact us 303.566.0373

© 2018 - Cybersecurity Solutions Strategies and Products | Techimon