Identify and assess risks to certification

We conduct structured risk assessments aligned to NZISM, supporting certification efforts by identifying threats, vulnerabilities, and effective risk treatments
Talk to an expert
Risk Assessment

Understanding and managing your organisation’s risk

A risk assessment puts information security threats into context for your business and provides security control recommendations to manage risk to a level that is tolerable to you. We work closely with you to understand how your business functions and how you use technology.

  • Helps identify and determine key assets and risks of your organisation by performing an in-depth analysis in all aspects of your business, from technology to people.
  • Tailored to your organisation’s specific needs and requirements.
  • Provides pragmatic recommendations, strategies and advice to help you mitigate and prevent risks and their overall impact on your organisation.
Service detail

No two risk assessments are the same

Our risk assessments are conducted with a very ‘hands-on’ approach. Our team will work extensively closely with yours to gain a clear understanding of your business, your people, and your vision. This helps us to ensure that our risk assessments are finely tailored to meet your organisation’s specific needs and provide you with the most value.

The risk assessment process

Your organisation, our expertise

After gaining a clear understanding of your business and what it makes it tick, our team of experts dives into the finer details, from policy and procedure documentation, technical configurations, to asset identification. Identifying the key risks and threats, how they impact you, and what can be done to improve.

  • Key assets are identified and analysed (e.g., servers, databases, customer information), in-depth analysis of various artefacts is conducted, and your level of risk tolerance is determined.
  • Risks, threats, and vulnerabilities are identified, with clear rationale as to how they will impact your organisation, along with the likelihood of their occurrence.
  • A clear and concise report is provided to you detailing our findings, expert analysis, and practical recommendations for future improvement following industry best practices and standards e.g., NZISM.
Our delivery process

Delivery of a Security Risk Assessment

Conduct workshops and analyse information to gain both business and technical contexts and establish a comprehensive understanding of your organisation, key systems, assets, and risks.
Workshops
Establish a comprehensive understanding of your organisation, key systems, assets, and risks.
Assess Risk
Establish a full picture regarding the security posture of your organisation and key systems.
Quantify Risk
Assess and determine the inherent risk of your organisation and key systems.
Benefits

Why work with us

From globally recognised industry certifications, practical and industry knowledge, to a vast repertoire of clients and industries. Bastion has the ‘know how’ to help you.
One stop shop
Our expansive team consists of experts knowledgeable in numerous fields and practices of information and cybersecurity.
Degree of protection
Our recommendations and tailored solutions are designed to offer you a considerable degree of protection from an ever-changing cyber threat landscape.
Trusted advisor
Bastion holds numerous globally recognised industry certifications in various fields and practices of cybersecurity.
What comes next

Expand your security coverage

Conducting a risk assessment is just the first step in protecting your organisation. The true fruits of a risk assessment come after, with proper risk remediation, control implementation, ongoing assessment and improvement. Bastion is here with you for the long-haul.

  • Provide you with practical and pragmatic recommendations and actionable insights to help you stay one step ahead of threat actors.  
  • Help you get ready for future assessments with us to help ensure ongoing improvement for your organisation.
  • We will help you identify areas of risk, vulnerability, and improvement going forward and provide guidance on the best controls to implement for remediation and uplift.
Talk to an expert
Executive and Board Security Governance Training
We train executives and boards on their cybersecurity oversight role — focusing on risk framing, accountability, and key governance responsibilities.
Instructor Led ISO27001 Training
This instructor-led course equips participants with the knowledge and skills needed to become certified to lead, plan, and conduct ISO 27001 audits.
Frequently asked questions

Frequently asked questions

From risk assessment to rapid response - we’re with you every step of the way.

What is a risk assessment?

A risk assessment is a point-in-time assessment of your organisation and/or relevant systems. The process involves in-depth analysis and identification potential threats and vulnerabilities to your organisation and/or systems. The potential likelihood and impact of these risks are assessed, and tailored controls and recommendations are applied and provided to help remediate or mitigate them.

Should I get a risk assessment done?

A risk assessment is applicable to any individual, organisation, or entity that utilises and relies on digital systems, networks, and/or data. Risk assessments can apply to businesses of various sizes, financial institutions, healthcare providers, IT & Cybersecurity professionals, and even government agencies.

When do I get a risk assessment done?

A risk assessment can be initiated at anytime to gain a current understanding of potential risks. However, some key times to start a risk assessment are: Before launching a new system or website, after a security incident or breach, after major regulatory or compliance changes, after major IT infrastructure changes, and finally, risk assessments should be done on a regular basis (e.g., annually) to ensure ongoing compliance and keep up with an ever-evolving threat landscape.

How long does a risk assessment take?

The timeline of a risk assessment will vary depending on the nature of the assessment and the size of the assessment scope. A basic assessment only taking a few days, a standard one ranging from a week or two, to an in-depth one taking 3 weeks or more.

What is the outcome of a risk assessment?

A completed risk assessment will give you a clear understanding of the threats, vulnerabilities, and overall risks your organisation and/or systems face and how to mitigate and/or prevent them. The goal is to help prevent security breaches, ensure you’re compliant with laws and regulations, and prevent financial and reputational harm.

Contact us

Talk to an expert

Please call our office number during normal business hours or submit a form below
Where to find us
If you experience a security breach outside normal working hours, please complete the form and we will respond as soon as possible.