Cyber Recovery Risk Assessment

Would your organization survive a cybersecurity event? What risks could you face? How prepared are you?

Recovering from a data-compromising cyberattack requires planning, investments, capabilities, procedures, and more. You need a multi-disciplinary approach if you’re going to be ready to minimize business interruption from a cyber event.

This 20-question self assessment will help you understand your risk profile.

Cybersecurity Risk Assessment

Phase 1: Vital Data Asset Identification

[NOTE: 11:11 Systems refers to an organization’s “must have” or “mission-essential” data as their Vital Data Assets (VDAs). Generally speaking, this is data that requires advanced levels of data protection and recoverability.]

  1. Does your organization’s data backup program include a formal method for identifying your Vital Data Assets (VDAs)?
  1. Does your list of VDAs account for data interdependencies – both upstream and downstream – and logical data restoration bundles that are required to complete a critical business process?
  1. Has your list of VDAs been reviewed and approved by your organization’s executive management team (outside of IT)?
  1. Have you determined the minimum required recovery configuration for your VDAs?
  1. Have you identified the minimum required storage size for your cyber data vault based on production storage size, annual growth rate, and retention requirements for your organization?

Phase 1 of 4