Tue, Mar 24, 2020

New Product Release Notes - Core Assessment Version 2.1

The CyberClarity360 team is proud to announce another major update – Core Assessment 2.1. Based on feedback from our corporate clients, providers and others in the third-party cyber risk field, the subject matter experts at CyberClarity360 have improved upon the current assessment by:

  • Adding additional guidance notes to help non-technical audiences understand the questions
  • Adding usability updates such as a glossary and a quick start guide
  • Re-ordering of content to better align the logical and conceptual flow of the questions
  • And more!

Download the full report by clicking the “Download” button. Please reach out to [email protected] to learn more or get a demo to see how CyberClarity360 can help you reduce your third-party cyber risk.

Guidance Notes

Many CyberClarity360TM providers are cyber security professionals, but not every organization that is assessed on our platform has security professionals on-staff. To increase the understanding around the assessment and the accuracy of the answers, and provide additional cyber risk education content for assessment participants, we have deployed two different guidance note modalities in our latest release: Executive and Extended Guidance Notes.

Executive Guidance Notes

Following each and every control question (for more on control questions vs. insight questions, see Cross-Category, Cross-Section Question Migration), CyberClarity360 users will find a button that reads “What does this mean?” Clicking on the button will reveal a short paragraph designed to help clarify the content of the question and some examples of how the control in question might manifest in an organization:

New Product Release Notes: Core Assessment Version 2.1

Extended Guidance Notes

The extended explanation, available within every single Executive Guidance Note by clicking on the “Extended Explanation” button will provide additional detailed and technical content.

These Extended Guidance Notes align the content of the question to the control framework it is evaluated against. The content of these notes often features detailed language describing the implementation, validation, or other related mechanics of the control, and also includes direct links to the source material available in the NIST Cybersecurity Framework as well as the underlying NIST SP 800-53 Revision 4 control.

New Product Release Notes: Core Assessment Version 2.1

Usability Updates

In addition to adding technical support content to the assessment in the form of guidance notes, the CyberClarity360TM Core 2.1 release features an improved workflow (see Content Reordering), a complete glossary of the technical terms utilized across the assessment, and an embedded quick-start guide that allows users to make rapid, yet informed, progress in their assessment journey.

Glossary

Because much of the terminology used within the CyberClarity360TM Core Assessment are domain-specific and often highly nuanced (i.e. the difference between network segmentation and network segregation), a glossary is available to all users.

Our glossary includes full definitions of the terminology utilized within the assessment and is  searchable. It is our hope that this glossary helps users better understand what is meant by each question, and it allows them to provide accurate assessments based on a clear understanding of not only the control question but the implementation of that control within their organization.

Quick Start Guide

The CyberClarity360TM Core 2.1 Assessment introduces a new category (Instructions) and section (Quick Start Guide) to support users who want to begin completing their assessment as rapidly as possible, but may have one or two outstanding question around platform functionality.

The Quick Start Guide covers various features and functionalities of the platform, including the aforementioned glossary, how to select and save answers, our delegation functionality to support collaboration within or beyond your organization, the question-level comments and evidence capability to support a rich and wholistic representation of one’s security posture and the certification and submission process.

Additional details can still be found in the Assessment Details menu, located at the top of each Assessment page, but the Quick Start Guide should get most participants making forward progress in short order.

Content Reordering

In addition to the features described above, there have been several changes made to the question order, scoring, and weighting mechanics of the CyberClarity360TM 2.1 Core Assessment. A detailed explanation of each is listed below.

Cross-Category, Cross-Section Question Migration

To better align the logical and conceptual flow of the questions, and more closely pair the control questions with their supporting insight questions, the following questions have been moved from one category and section into another category and section:

 

2.1 Question #
Previous Category
Previous Section
New Category
New Section
6
Identify
Asset Management
Organization
Target Profile
73
Organization
Culture and Morale
Protect
Awareness and Training
74
Organization
Culture and Morale
Protect
Awareness and Training
118
Organization
Insurance Claims and Coverage
Detect
Anomalies and Events
120
Organization
Insurance Claims and Coverage
Detect
Anomalies and Events
121
Organization
Insurance Claims and Coverage
Detect
Anomalies and Events
122
Organization
Insurance Claims and Coverage
Detect
Anomalies and Events
24
Organization
Demographic
Identify
Asset Management
25
Organization
Demographic
Identify
Asset Management
31
Organization
Information Security Team
Identify
Business Environment
34
Organization
Information Security Team
Identify
Business Environment
50
Organization
Certifications
Identify
Risk Management Strategy
51
Organization
Certifications
Identify
Risk Management Strategy
61
Identify
Asset Management
Protect
Identity Management, Authentication
and Access Control
67
Identify
Asset Management
Protect
Awareness and Training

Intra-Category, Cross-Section Question Migration

To better align the logical and conceptual flow of the questions, and more closely pair the control questions with their supporting insight questions, the following questions have been moved from one category and section into another category and section:

2.1
Question #
Previous Category
Previous Section
New Category
New Section
10
Organization
Demographic
Organization
High Risk
Territories
119
Detect
Incident History
Detect
Anomalies and Events
124
Detect
Incident History
Detect
Anomalies and Events
125
Detect
Incident History
Detect
Anomalies and Events
126
Detect
Incident History
Detect
Anomalies and Events
11
Organization
Information Security Team
Organization
High Risk
Territories
71
Protect
Information Protection Processes
and Procedures
Protect
Awareness and Training
72
Protect
Information Protection Processes
and Procedures
Protect
Awareness and Training
83
Protect
Information Protection Processes
and Procedures
Protect
Data Security
85
Protect
Information Protection Processes
and Procedures
Protect
Data Security
88
Protect
Protective Technology
Protect
Data Security
116
Detect
Incident History
Detect
Anomalies and Events
117
Detect
Incident History
Detect
Anomalies and Events

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Optimized Third-Party Cyber Risk Management Programs

Manage risk, not spreadsheets. Identify and remediate cybersecurity risks inherent in third-party relationships, helping achieve compliance with regulations such as NYDFS, FARS, GDPR, etc.

Data Protection Officer (DPO) Consultancy Services

Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.


Virtual CISO (vCISO) Advisory Services

Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.