SiDlogo primary gradient iamge

Cyber Assurance Risk Rating (CARR)

Security in Depth’s Cyber Assurance Risk Rating (CARR) solution provides a world class, reliable, quantitative measurement of your current cyber security performance, without subjectivity

The CARR program provides a 360-degree view of an organisation’s cybersecurity environment, encompassing technical aspects, governance, culture, and both internal and external elements. This comprehensive approach ensures a robust and tailored cybersecurity risk assessment.

Chart iamge

What our clients say:

“We have recently gone through the process of the CARR review with Security in Depth and found it incredibly informative and useful. Cyber security is something we take extremely seriously and we were very impressed with the professionalism and ease of understanding the review process conducted by Security in Depth. We highly recommend this service to other businesses.”

- Brokerhouse

Our main aim with the CARR program is to offer a comprehensive analysis and support system to fortify your cyber security posture, aligning it with industry best practices and ASIC requirements.

Overview:

  • Initial 2-hour Review: We conduct a thorough 2-hour review that delves deep into all facets of your organisation’s cyber infrastructure.
  • Detailed Report: Post-review, we send a comprehensive report highlighting areas that need improvement and showing the current maturity level of your cyber program.
  • Free One-Hour Consultation: As part of our commitment to support your organisation, we provide an additional 60-minute consultation session with our seasoned Cyber Team. They will guide you through the recommended remediation steps and help you understand and address the best approaches to remediate areas identified in the report.
  • Follow-Up Validation Review: This is recommended 3-6 months after your initial review. It includes a 45-minute online meeting with a consultant, to validate that all remediations in your initial CARR outcome report have been implemented effectively. You will then receive an updated CARR Report with improved scores reflecting accordingly

Ready to book in your review?

BOOK NOW

Identify icon

IDENTIFY

Your cyber Governance. This includes your policies and procedures, training and awareness and more.

Protect icon

PROTECT

This is where we review your technology and how the technology is configured to safeguard your business.

Detecticon

DETECT

This is all about how you monitor and report unusual activity across your business.

Responeicon

RESPOND

This is where we review your incident response capabilities and documentation.

Recover icon

RECOVER

This is about getting your business back to normal after a cyber event, and your ability to achieve this with minimal disruption.