Where is my organization at risk and how can I quantify that risk?
PeriCertum uses an analytical platform to provide a business-based, monetary valuation for the critical decisions in the definition of your cyber prevention roadmap.
Which cyber projects should we invest in to best reduce our risk given a limited budget?
Spend your cybersecurity budget efficiently by understanding how specific efforts will financially impact your cyber risk.
How much risk do we have from third-party sources?
PeriCertum provides a strategic approach to understanding the cyber risk associated with dealing with your customers and suppliers so that you can make better decisions about with whom you do business.
IT leaders say cybersecurity jobs are the most difficult to fill
Average Cost of enterprise data breaches
Growth of fileless attacks over the first half of 2019
Increase of attacks on IoT devices in the first half of 2019
Companies (last 12 months) saying data compromised via hardware-level breach
Breaches involved unpatched vulnerabilities
Lost every minute due to phishing attacks
Reported security incidents that are phishing
Amount of malware delivered via email
Confronted with an upcoming Board of Directors meeting to set our CyberSecurity budget, we engaged PeriCertum to help identify and select projects we should fund and execute. PeriCertum’s insurance-grade financial quantification tools gave us the data and confidence to invest in projects that substantially reduced our Cybersecurity risk.
- Jonathan Eby, Concord SVP of IT
Our company, an ERP implementation firm, suffered an email attack against one of our executives. PeriCertum rapidly implemented an Advanced eMail Protection solution protecting the whole company. This solution has virtually eliminated these attacks.
- John, Executive VP / CTO
Answer 5 questions about your Cybersecurity environment to learn how you compare with other organizations and receive your copy of the Marsh/Microsoft Cyber Perception Survey ResultsTake The Survey
The following are excerpts from a blog article written by Greta Egan, a security awareness training strategist for…Continue Reading
For many generations our personal and business records remained private for only those who had permission to have…Continue Reading