On this page
Service Overview
In a world where new threats and vulnerabilities emerge constantly, new regulations and industry best practices are published, developing an effective cybersecurity program is of the utmost importance. In order for any business to prioritize cybersecurity investment and build a defensible cybersecurity program, a risk assessment must be performed to identify and understand organizational risk.
This Risk Assessment will provide a comprehensive evaluation of your organization, provide a clear view of its top risks, and detailed recommendations for effectively mitigating those risks so that you can best align budget and resources where they are most valuable.
This Statement of Work identifies the objectives, scope, methodology, deliverables, client requirements, and assumptions for all work to be completed by DeepSeas.
Objectives
The objectives of this initiative are as follows:
- Identify and prioritize cybersecurity risks in the environment.
- Support protection of critical assets.
- Support compliance with legal, contractual, and regulatory requirements.
- Quantify findings so that they are universally understood and easily communicated.
- Develop a prioritized list of top risks and an actionable plan for risk mitigation.
Methodology
This Risk Assessment project consists of the following phases:
- INTERVIEW SCHEDULE
- The client will identify the departments and stakeholders required to attend interview sessions and a risk workshop by completing the interview schedule provided by DeepSeas.
- ASSET INVENTORY DEVELOPMENT
- The client will develop an asset inventory with associated risk profiles to conduct the risk assessment. DeepSeas will consult on mapping assets to the risk workbook and the creation of risk profiles.
- RISK WORKSHOP
- DeepSeas to conduct a risk workshop with ISMS Manager & risk owners, as defined in the interview schedule, to evaluate vulnerabilities and quantify risks for all asset categories.
- Each vulnerability/weakness will be assessed on:
- Likelihood of a measurable event occurring from vulnerability exploit
- Potential Impacts from vulnerability exploit
- Vulnerability/weaknesses will be prioritized based on risk to the organization.
- DOCUMENTATION
- DeepSeas will develop a formal Risk Assessment Report.
- PRESENTATION
- DeepSeas will schedule a call with the Client to review all deliverables as part of the engagement.
Deliverables
DeepSeas will produce the following deliverables:
- RISK ASSESSMENT REPORT - DeepSeas will deliver a risk assessment report with details pertinent to identified risks and the recommendations for remediation.

Back to Service Library