Taking Security Measures into the Corporate World



This questionnaire will provide insight into banking, fraud prevention and security procedures focusing on monitoring, investigations and corporate responsibility.

SKU: 56c61f00-e3ff-432f-906d-914d4af64765 Category: Tags: , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The compliance department that needs to convince risk management managers about the opportunity of further developing a secure environment.
  • The Chief Executive Officer who is interested in helping the company's board with risk managing strategies.
  • The Internal Audit team that aims to ensure the development of cost-effective security measures.
  • The Information Security Manager who wishes to develop policies regarding data protection and cybercrime prevention.
  • The Security Operations Manager who strives for quick responses to any security threats.
Fraud Prevention
Proactive techniques for stopping malicious activities

Monitoring Techniques
Systems and procedures used to identify unauthorized actions

Security Procedures
Practices used to protect confidential information

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. What measures have you implemented to raise cybersecurity awareness?
  1. No measures yet, we are unprepared.
  2. We run internal assessments and trainings to increase awareness.
  3. We engage with external professionals to customize a comprehensive program.

Q. To what extent have you implemented user access audits?
  1. No, we have no user access audits.
  2. We have a basic set of user access audits that look for anomalies.
  3. We have a fully formalized user access audit process in our organization that we execute regularly.
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Taking Security Measures into the Corporate World”

    Your email address will not be published. Required fields are marked *