A report the board can read and use.
Short text, clear picture, no jargon. What works, what doesn't, and which questions the board should ask itself. Enough context to decide, no more.
Get sharp clarity in a few days on where your governance over cybersecurity does and does not work.
Tools and people are in place. The question is whether the board can demonstrate the organisation is in control. This diagnosis surfaces that governance. We sit at the table as senior architect, not as auditor or vendor.
You probably recognise yourself in one of three situations. Not a verdict, a pattern we see at organisations with 500 to 10,000 workplaces.
"Are we exposed to this new regulation." "Are we ready if it goes wrong." The answer doesn't come, or comes fragmented.
SOC, SIEM, IAM, GRC. All present, all owned. No one watches the system as a whole.
Each quarter, figuring out again where which numbers come from. It costs too much time and the result convinces no one.
No report to leaf through and put aside. The outcome is something you can use in the next executive meeting, and every one after.
Short text, clear picture, no jargon. What works, what doesn't, and which questions the board should ask itself. Enough context to decide, no more.
Three to five moves that matter now, with reasoning why these. Per move an indication of effort, duration and ownership.
CISO, IT, finance and board talk about the same thing afterwards. That is not soft. It determines whether a second conversation is productive, or starts over.
Five steps, in two to three weeks. No fixed template. We calibrate to your context, the rhythm stays.
Documentation and context. Policy, org chart, recent board notes, audit findings. A first one-hour call to test assumptions.
With CISO, IT management, a representative from the primary process, and where relevant CFO or board member. Four to six 45-minute sessions. No interview script, but a thread.
SOC output, risk register and incident history of the last year. We don't look for what's missing. We look at whether what's there is used for governance.
We write, you check. An interim version to the CISO for factual corrections. No consensus round. The architect remains owner of the conclusions.
Final report, plus a verbal presentation to the meeting you choose. Board, audit committee, leadership team. One hour is enough.
A diagnosis is a conversation between people, not a survey of a department. We keep the circle small and the conversations concrete.
One central contact, usually the CISO or Security Manager. Around them a workable circle of stakeholders we speak with.
No team, no junior doing the work. The architect who runs the first conversation writes the report and presents it.
What this costs depends on your context and scale. We are upfront about effort and duration, so you know what you're asking for.
From kick-off conversation to final presentation. No acceleration on request. The rhythm is part of the quality.
Spread over the duration. Including preparation, conversations, synthesis, final report and presentation to the meeting.
A fixed amount per diagnosis, after the orienting conversation. No hourly billing, no scope creep.
For clarity, what this is not.
We have no partnerships with vendors. If a tool fits, we say so. If there is one too many, we say that too.
An audit assesses whether you meet a standard. A diagnosis assesses whether your governance works. Two different questions.
We don't break in. For pentesting we collaborate with specialised parties and interpret their output in context.