Cyber security maturity assessment

Where does your security strategy stand?  What are your biggest risks?  Where should you focus your efforts?  Netmechanics’ Cyber Security Maturity Assessment utilizes best practices and recognized cyber-frameworks to answer these questions surrounding your existing security program.  A lot of security companies use frameworks that are designed for large organizations, we specialize in small businesses which means we have taken these frameworks intended for large organizations and we have customized them so they work for small business.

The goal of the Cyber Security Maturity Assessment is to provide a view of your current security posture, an objective view of existing plans, and a guide to strategic planning.  It will also help your organization develop tactical and strategic directions to further mature and strengthen your security program efforts.  The Cyber Security Maturity Assessment better positions your program to meet (and exceed) compliance standards, but most importantly, it aligns with and supports your business goals.

How It Works

The Cyber Security Maturity Assessment focuses on specific controls that protect critical assets, applications and data by assessing your organization’s security posture.  The assessment also emphasizes best practices as well as the organizational effectiveness and maturity of internal policies and procedures.

The Cyber Security Maturity Assessment is performed against our custom framework which is born from several different cyber security control sets and frameworks such as Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework (NIST CSF) and ISACA’s COBIT.

Your assessment will be conducted by our resident Advisory Services experts. who have over 20 years of experience across different industries.  This ensures your plan makes the most sense for your organization’s needs.


Assessment Overview

But what does the assessment actually entail?  A Netmechanics Cyber Security Maturity Assessment engagement is divided into three phases and consists of onsite interviews, phone or video interviews, an external vulnerability assessment, and a detailed review of policies and operational procedures.  We’ll dig in to your organization’s people, processes and technology (with the focus being on people and processes).


The final output will consist of the following:


  • A one-page summary with an executive analysis and scorecard
  • A roadmap for your organization
  • Key tactical and strategic recommendations
  • Observations by the consultants
  • Identified gaps and focus areas
  • A detailed report


 The report is intended to address areas with the highest impact and risk, and give you detailed information for implementation.