A One-stop Solution for Cyber Resilience

People
Workforce Risk
Creating a Culture

Processes
Regulations & Frameworks
Compliance

Technology
Technology
Cybersecurity

Vendors
Vendor Risk Tracking
Vendor Compliance Management

Our CyberCompass one-stop solution for cyber resilience create continuity across your:
- People = Workforce surveys
- Processes = Regulations & Frameworks
- Technology = Technology scans
- Vendors = Vendor risk tracking

Inform
Workforce Risk
Assess the security of your remote workforce, contractors and vendors with our Remote Workforce Security survey. See real time results that prioritize your risks, give guidance for correction and allow you to mark items as corrected to update your dashboard. Survey items include:
- firewall scan
- internet speed test
- cyber hygiene questions, such as password and workspace security
- availability of resources




Regulations and Frameworks
CyberCompass has the ability to combine multiple regulations and frameworks into a single assessment, saving you time and money. Since most state, local and industry specific standards are based on similar parent frameworks, we are able to quickly add the subtle differences in each regulation to our larger information database. CyberCompass currently assesses for:
- CCPA
- CIS-20
- CMMC (based off NIST 171)
- GDPR
- HIPAA
- NAIC 668 (and state specific regulations made from this standard)
- NY DFS Reg 500
- TCPA
- Trusted Partner Network (TPN)
Regulations and Frameworks
CyberCompass has the ability to combine multiple regulations and frameworks into a single assessment, saving you time and money. Since most state, local and industry specific standards are based on similar parent frameworks, we are able to quickly add the subtle differences in each regulation to our larger information database. CyberCompass currently assesses for:
- CCPA
- CIS-20
- CMMC (based off NIST 171)
- GDPR
- HIPAA
- NAIC 668 (and state specific regulations made from this standard)
- NY DFS Reg 500
- TCPA
- Trusted Partner Network (TPN)


Technology Risk
You cannot fix your vulnerabilities until you know where they are. CyberCompass offers a suite of scans and testing specifically designed to pinpoint the vulnerabilities within your IT infrastructure. These include:
- Protected information search and scans
- Web application scans
- Operating system vulnerabilities and compliance scans
- Network vulnerability scan
- External penetration testing
- Network communication scans
- Code reviews


Vendor Risk
Your vendors should be held to the same standard of data protection as your own company. If you provide customer data to an unsecured vendor, you could still be liable for lost data.
- Survey vendors about security
- Track compliance to security framework your business is under
- Document proper security certifications




Vendor Risk
Your vendors should be held to the same standard of data protection as your own company. If you provide customer data to an unsecured vendor, you could still be liable for lost data.
- Survey vendors about security
- Track compliance to security framework your business is under
- Document proper security certifications
Ready to start your journey to cyber resilience?


Our CyberCompass one-stop solution for cyber resilience creates continuity across your:
- People = Culture of cybersecurity through training
- Processes = Compliance
- Technology = Cybersecurity plans
- Vendors = Vendor compliance management



Apply
Creating a Culture
Employees are consistently reported as the weak link in cybersecurity defenses. Depending on who is providing the statistic, anywhere from 60-90% of breaches are caused by human error. Creating a culture of cyber resilience starts with increasing your human firewall.
CyberCompass Academy provides relevant cybersecurity awareness training. With short, impactful modules, your employees will learn quick tips that are easy to apply but can have a great impact on your over data protection.
Want to see how your employees stand up to simulated phishing scams? Through our partnership with Hook Security, you can see which of your employees fall for the scam and how they improve with additional training and simulations over the course of the year.
Compliance in Action
Each regulation and framework has their own version of proving compliance. Whether that is to present a certification by a specific deadline or to maintain a body of evidence until needed, CyberCompass has the tools you need to comply with all expectations.
- Up-to-date policies and procedures – Use our pre-built templates or have one of our experts help you customize them
- Documentation of a valid security risk assessment
- Encrypted vault to house all compliance documentation
- Prioritized action items to increase your cyber resilience
- Real-time dashboard that tracks your progress as you complete action items to reduce your risk




Cybersecurity Plans
An important component to any cyber resilient business are the plans put in place in the event of business interruption. While many companies plan for how to deal with a breach, other interruptions, such as a natural disaster or pandemic, should also be accounted for. Get a complete set of business continuity plans to help your business survive and thrive through an interruption.
Risk Management Plan | Business Impact Plan | Contingency Plan |
IT Security Plan | Workforce Security Plan | Cybersecurity Incident Plan |
Breach Response Plan | Internal Compliance Plan | Pandemic Plan |
In response to COVID-19, CyberCompass also offers our Remote Workforce Survival Guide to help you make the best decisions on when to close, when and how to reopen safely and procedures you need to put into place to ensure the physical and cyber safety of your employees.
Cybersecurity Plans
An important component to any cyber resilient business are the plans put in place in the event of business interruption. While many companies plan for how to deal with a breach, other interruptions, such as a natural disaster or pandemic, should also be accounted for. Get a complete set of business continuity plans to help your business survive and thrive through an interruption.
Risk Management Plan | Business Impact Plan | Contingency Plan |
IT Security Plan | Workforce Security Plan | Cybersecurity Incident Plan |
Breach Response Plan | Internal Compliance Plan | Pandemic Plan |
In response to COVID-19, CyberCompass also offers our Remote Workforce Survival Guide to help you make the best decisions on when to close, when and how to reopen safely and procedures you need to put into place to ensure the physical and cyber safety of your employees.


Vendor Compliance Management
Our built in vendor compliance management system allows you to easily find and add vendors. Document their contractual agreements, security requirements and certifications in one location. Our resource library also provides extra documentation and tools for your optional use.

