cybercrime and information security

Original price was: € 199,00.Current price is: € 0,00.


Hackers are able to attack more easily thanks to the internet and it technologies. More and more organizations must face cyber-threats and protect their networks and data. Take a look at cybercrime risks, threats you may encounter and how you can identify the easiest ways to protect your company.

  • The CIO who needs to assure the company's safety.
  • The CISO who is assigned to investigate the organization's information security.
  • The ISO auditor who requires a formal measurement rod.
  • The SME owner who operates his business for a part online.
  • The consulting partner who needs to assess his client's situation.
how to get the right workstation

how to implement cyber security measures

what is it and why do we need it?

Cyber countermeasures
protecting against cyber attacks

Risk assessment
understanding risks and threats, taking action, monitoring progress

Risk management
managing risk through processes, controls and people's behavior in an organization

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. What is your approach when a new piece of information technology (IT) is brought in?
  1. I do not know
  2. I arrange to see the application
  3. I check that it works well and fit with our information security policy

Q. How do you ensure that IT is used as appropriate?
  1. I do not specifically check
  2. I verify that the computers are switched on at workstations
  3. I periodically ask colleagues if they have the IT they need
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
oliverwymanThe procurement value in telecom_optimiert.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “cybercrime and information security”

    Your email address will not be published. Required fields are marked *