Questionnaire

We would like to ask you to complete a questionnaire to provide us with essential information about your organization’s information security posture. The purpose of this questionnaire is to gain a better understanding of your requirements for information and cybersecurity solutions and services so that we can provide the best possible offer tailored to your organization's needs. Please note that all responses to this questionnaire will be treated as confidential and will only be used to improve our understanding of your organization’s cybersecurity needs.

    1 /
    Company/organization’s Name
    2 /
    First name and Surname
    3 /
    Email Address
    4 /
    Phone Number
    5 /
    What specific type of service are you interested in receiving assistance with?

    Please check all that apply.

    6 /
    Please briefly describe your business or the scope of your organization’s work.

    (e.g. we sell office equipment)

    7 /
    How many employees do you have?

    The size of an organisation is a substantial factor in determining an effective security management system.

    8 /
    Please briefly describe the organizational structure of the company.

    (e.g. 5 core divisions – Production, IT, Sales & Marketing, Legal & Finance, HR)

    9 /
    List localities you use for your business and their basic character.

    (e.g. office building with its own reception)

    10 /
    What legislation applies to your business?

    (e.g. Personal Data Protection Law etc. Please also indicate if you have not yet assessed what legislation applies to you.)

    11 /
    How many information systems do you have?

    Please name them (e.g. Customer relationship management, Enterprise resource planning etc.)

    12 /
    What operating systems and platforms do you use?
    13 /
    Please list key services that your company outsources to third parties.

    (e.g. application development and maintenance, data center management etc.)

    14 /
    What kind of information does your company process?

    (e.g. customer data, personal data, payment data, etc.)

    15 /
    Have you ever performed any kind of audit in terms of information security?

    ( e.g. ISO27001, SOC 2, CyberGRX assessment etc.)

    16 /
    How many workstations and mobile devices do you manage (you have control over them)? How many more are used for your business and you do not have control over them?

    Please indicate at least the approximate numbers.

    17 /
    Do you maintain your own infrastructure (servers and networks) on the premise? Do you operate some part of your infrastructure in cloud? What kind of cloud services do you use?

    (e.g. IaaS, SaaS, etc.)

    18 /
    Have you assessed security requirements from your customers (based on service agreements) and other legal and regulatory risks?
    19 /
    Have you assigned a person responsible for information security?

    (e.g. the target date by which you need to receive the service due to an audit deadline)

    20 /
    Have you ever conducted a risk assessment for your business/organization?
    21 /
    Have you documented your company assets?
    22 /
    If you develop your own systems or applications, including those for third parties, do you have a secure development lifecycle, follow best practices like OWASP top 10, and conduct secure architecture design, code analysis, vulnerability scanning, and penetration testing?
    23 /
    Is there any specific service you would like to discuss with us, or is there anything else you feel is important to mention?
    24 /
    We are interested in learning about the factors that have led you to reach out to Binary Confidence.

    Please check all that apply.