Sector, role, and organization
The report is framed by function: risk exposure for security and executive audiences, control gaps for GRC, cost and ROI for finance, workforce and vendor data for HR and legal.
Select your industry. This sets regulations, primary threats, and frameworks for your report.
Select the function that best matches how you’ll use this report. Report content is tailored to this lens.
What’s in scope
Each type maps to specific control requirements. Tick “Outsourced” where a third party processes or stores it.
Data handling role
How your organization acts regarding this data (GDPR/CCPA: controller vs processor)
In scope
Select at least one. Aligned to universal asset classification; frameworks map to control requirements.
Primary informational Tier 1
Customer/employee records, financial, IP, regulated data — high sensitivity
NIST PR.DS
OCR Audit
SOX
ISO 27001
NIST 800-171
Supporting Tier 2
Legal, compliance evidence, contracts — operational sensitivity
Audit evidence
Vendor risk
Infrastructure / operational
OT, ICS, SCADA — industrial and critical systems
ICS-CERT
Actual questions and report flow
This section contains the real assessment engine, not the placeholder website summary.
Sector, role, and organization
The report is framed by function: risk exposure for security and executive audiences, control gaps for GRC, cost and ROI for finance, workforce and vendor data for HR and legal.
Select your industry. This sets regulations, primary threats, and frameworks for your report.
Select the function that best matches how you’ll use this report. Report content is tailored to this lens.
What’s in scope
Each type maps to specific control requirements. Tick “Outsourced” where a third party processes or stores it.
Data handling role
How your organization acts regarding this data (GDPR/CCPA: controller vs processor)
In scope
Select at least one. Aligned to universal asset classification; frameworks map to control requirements.
Primary informational Tier 1
Customer/employee records, financial, IP, regulated data — high sensitivity
NIST PR.DS
OCR Audit
SOX
ISO 27001
NIST 800-171
Supporting Tier 2
Legal, compliance evidence, contracts — operational sensitivity
Audit evidence
Vendor risk
Infrastructure / operational
OT, ICS, SCADA — industrial and critical systems
ICS-CERT
Critical functions & systems optional
Select the business functions and systems that matter most for cascade and concentration. This personalizes the report and improves vendor-to-function mapping.
Critical business functions
Which functions drive your operations and regulatory exposure
Critical systems
Systems that support those functions — improves cascade path narrative
Vendor / service types
Select which types of third-party services you use. This captures risk and concentration for your report.
Service types
Select the types of services that process or store your data. This scopes risk and concentration in your report.
Vendor names optional
Add specific vendor names to include in the report and Vendor Risk Radar. You can skip this and still generate.
Your security posture report is ready.
The command center consolidates your sector exposure brief, organizational assessment, vendor and industry threat intelligence, and privacy risk analysis into a single interactive hub. Select any tab below to drill into a specific dimension of your risk posture. Each module can be exported independently for stakeholder distribution.
Prioritized recommendations derived from your role, sector, asset scope, and identified gaps. Use these to assign owners and sequence remediation.
A phased, time-bound remediation plan sequenced by risk impact and calibrated to your role and sector. Each phase identifies the recommended action, why it is prioritized at that stage, and what outcome to expect. Use this roadmap to assign owners, set milestones, and track measurable risk reduction.
Evidence types and references that support this report. Use for audit trail, control mapping, and framework alignment.
This report produces six actionable deliverables, each calibrated to your role, sector, and the assets you identified. Four are ready now; two unlock with platform enrollment. Use the descriptions below to understand what each deliverable contains, why it matters, and where to access it.
Vendor / service types
Select which types of third-party services you use. This captures risk and concentration for your report.
Service types
Select the types of services that process or store your data. This scopes risk and concentration in your report.
Vendor names optional
Add specific vendor names to include in the report and Vendor Risk Radar. You can skip this and still generate.
Your security posture report is ready.
The command center consolidates your sector exposure brief, organizational assessment, vendor and industry threat intelligence, and privacy risk analysis into a single interactive hub. Select any tab below to drill into a specific dimension of your risk posture. Each module can be exported independently for stakeholder distribution.
Prioritized recommendations derived from your role, sector, asset scope, and identified gaps. Use these to assign owners and sequence remediation.
A phased, time-bound remediation plan sequenced by risk impact and calibrated to your role and sector. Each phase identifies the recommended action, why it is prioritized at that stage, and what outcome to expect. Use this roadmap to assign owners, set milestones, and track measurable risk reduction.
Evidence types and references that support this report. Use for audit trail, control mapping, and framework alignment.
This report produces six actionable deliverables, each calibrated to your role, sector, and the assets you identified. Four are ready now; two unlock with platform enrollment. Use the descriptions below to understand what each deliverable contains, why it matters, and where to access it.