top of page

Assessing Cybersecurity Risk

In the Information Technology (IT) and Operational Technology (OT) World

Our Cyber Risk Assessment Methodology 

Determining cybersecurity vulnerability often comes down to asking the right questions. That’s why this new resource was developed as a set of comprehensive questionnaires designed to address the different issues associated with incorporating new PropTech solutions into existing building networks or evaluating current systems deployed within building networks.

Which is Right For You?

We focus on 12 distinct risk categories that help uncover potential cyber vulnerabilities:

  • General Company Information

  • Physical Security

  • Network Topology

  • Data Center

  • Vulnerability Management

  • Data Storage

  • Authentication & Administration

  • Remote Access & Mobility

  • System Endpoint

  • Policies, Protocols, & Procedures

  • Business Continuity Planning

  • Training & Development

Which Risk Assessment is Right For You?

There are two cybersecurity risk assessment questionnaires to address nuances of both Information Technology (IT) and Operational Technology (OT):

​

  • Product/Vendor - Existing

  • Product/Vendor - New

Complete our brief request  form to receive access to the cybersecurity risk assessment questionnaire.​ 

​

This will also allow the Global Cyber Consortium to  keep  apprised of  the latest cyber changes

bottom of page