Custom Threat Assessment Reporting
Monthly reporting with Security Risk Rating and custom Power BI dashboard
Reports include a key stats overview for C-level staff plus a detailed list of critical remediation actions to work through.
Demonstrate progress and continuous improvement with a month-on-month Security Risk Rating.
Mapped to the NIST Cybersecurity Framework and relevant CIS Critial Security Controls.
A unique approach to reporting
RedQor reporting goes further than other vendors. We supply prioritized recommendations for critical actions that will have a real impact on cybersecurity, and we help you deliver them. Even better, we can create completely custom reports using Microsoft Power BI – including a dashboard of your key metrics – so your reports can be as unique as each customer.
We compile a Top 10 Vulnerabilities list from weekly vulnerability scans, aimed at improving the overall security posture of your customer. Security Risk Rating will improve monthy and clearly demonstrate the results of actions taken.
We are proactive in assisting your team to work through the action step by step, and in addition to this you will have a monthly CISSP-led meeting. This gives you access to a highly experienced security consultant who will guide you through the most critical issues you need to solve.
For regulatory reporting requirements, inSOC’s One Stop SOC Premium package provides specialized reports for HIPAA, DFARS, GDPR, CMMC and more.
What’s included in the reports?
A committed collaborative approach
For the C-level team we include a Threat Assessment Summary with a visual summary of the current status, and month-over-month improvements in the Security Risk Assessment.
We provide a comprehensive Remediation Plan with prioritised recommendations and anticipated timeframes for the technical team. This includes an asset report covering any authorised or unauthorised hardware that has been added or removed from the network during the month.
All actions are based on the NIST Cybersecurity Framework and mapped to the relevant CIS Critical Security Controls.