Overview and Instructions
The assessment is divided into nine sections comprising information from across the business spectrum:
- Business Profile
- Information Security
- Network Security
- 3rd Party Vendor Management
- Hardware / Software
- Mobile Devices
- Disaster Recovery / Business Continuity Plan
The CyberTiger Liability Risk Assessment focuses on people, capital, technology and operating procedures, the value of information and the costs involved if that information gets destroyed, stolen, or otherwise compromised. It might be necessary to engage other members from within your organization, e.g. Human Resources, Technology or 3rd party contractors, depending on the size and structure of your organization.
BE SURE TO “CHOOSE ALL THAT APPLY” ON EACH PAGE BEFORE CLICKING “SAVE & CONTINUE”. This will ensure your data is saved.
You may exit the assessment and return later without loss of your data. All information is confidential. The data is used to create a risk profile, a risk exposure and an expected dollar loss if such a loss occurs. This data assists cyber insurance underwriters to properly quantify your risks and also ensures you have sufficient coverage.
This assessment should take approximately 30 minutes to complete.
Again, welcome to CyberTiger!