IDENTIFY
Security Assessment
When it is time to assess your security risk, having the right partner with long-standing cyber regulation and FBI experience reduces cyber risk and liability.

For domains, networks, and endpoints
With detailed reporting and remediation recommendations
LOWERING BREACH RISK
Technical Controls Security Assessment

FCI uses a non-intrusive data collector to audit your networks and a data analyzer to process the collected data and produce a baseline set of cybersecurity reports.
Unlike most assessors, FCI performs a Technical Controls Security Assessment without any modification to network and system configurations, and without requiring opening firewall ports, which otherwise puts the security of the environment at risk during the assessment.
Assessment
- Internal and external vulnerabilities
- Automated vulnerability scan
- Network penetration testing
- Unrestricted Web content
- Local security policy consistency
- Identification of unfollowed technical governance procedures
- Risk Score
Compliance Evidencing
- Screenshots and pictures
- Summary and detailed reports
Remediation Plan of Actions
Pricing based on
- Number of domains, networks, servers, and endpoints
- Number of assessment teams for multiple domains or networks
How cybersecurity impacts company valuation in M&A transactions
Are you buying firms or selling yours?
Get an FCI Security Assessment performed to reduce liabilities
Testimonial
“FCI reduces our liability risk with a thorough Security Assessment of the Firms we acquire.”
Liz Tluchowski
Chief Information and Security Officer Principal

World Insurance Associates LLC
Security Risk Assessment
For Domains, Networks & Endpoints
Information Security Policies & Procedures
- Cyber Program
- Business Continuity Plan
- Security Incident Response Plan
- Remediation & Incident Respone
- Cyber Insurance Value & Coverage
- Vendor Risk Management
- Endpoint & Network Protection
- Endpoint & User Onboarding & Offboarding
- Asset Inventory & Cyber Posture Report
- Cybersecurity Awareness Training & Phishing
Technical Controls Security Assessment
- External & Internal Vulnerabilities
- Automated Vulnerability Scan
- Network Penetration Testing
- Dark Web Credential Scan
- Unrestricted Web Content
- Local Security Policy Consistency
- Identification of Unfollowed Technical Governance Procedures
Compliance Evidencing
- Screenshots & Pictures
- Summary & Detailed Reports
- Risk Score
Remediation Plan of Actions
- Remediation Recommendation
Pricing based on
- Number of domains, networks, servers, and endpoints
- Number of assessment teams for multiple domains or networks