1. Areas Rank 1 2 3 4 5
    Network perimeter / DMZ (web servers)  
    Desktops (PCs), Laptop, Notebook, Mobile Devices  
    Datacenter (physical & virtual servers)  
    Social media applications (Facebook, Twitter)  
    Cloud Applications (SaaS) (ERP, HR, CRM, SCM, BI)  
    Web applications (custom built)  
    Cloud infrastructure (IaaS, PaaS)  
  2. Hostile Insider Threat Rank 1 2 3 4 5
    IP Theft  
    Fraud  
    Espionage  
    Sabotage  
    Monetizing Sensitive Data (such as credit card or social security numbers)  
  3. Deterrents Select One
    Lack of Cybersecurity Skillset
    Lack of Advanced Threat Identification Tools
    Changing Dynamics of Industry specific compliances
    Poor integration / interoperability between security solutions
    Low Security Awareness Among Employees
    Others (Please specify)
  4. Solution Rank 1 2 3 4 5
    Threat Hunting  
    Threat Detection  
    Managed Response  
    Managed Remediation  
    Others (Please specify)  
  5. Action Next 6 months Next 12 months
    Use security software from independent software vendor(s)
    Deploy additional security solutions from vendors
    Partner with a MSPs who will provide the resources
    Expand existing relationship with MSPs
    Train and/or certify existing IT staff to become security experts
    Hire a skill full cyber security expert
    Others (Please specify)