Maverick Labs

SPF Cyber Risk Assessment

www.maverick-labs.us
Security Posture Facilitator

Assess Your Cyber Risk.
Protect Your Organization.

The SPF Pre-Loss Cyber Risk Assessment helps organizations understand their security posture and provides a roadmap to get ahead of the threat. Built on NIST CSF and FAIR standards.

Choose Your Assessment Level

Select the assessment that best fits your organization's needs. Each level builds upon the previous, providing increasingly comprehensive security analysis.

SPF Decision Maker
Do I Need a Cyber Risk Assessment?
FREE

A quick 7-question assessment to determine if your organization needs a professional cyber risk assessment. Get immediate feedback on your security posture.

  • 7 key cyber risk questions
  • Immediate scoring & feedback
  • No cost or commitment
  • Identify critical security gaps
SPF Self-Assessment
Comprehensive Security Self-Evaluation
$499

A thorough self-assessment covering essential functions, data management, technology infrastructure, business continuity, and threat analysis.

  • Includes all ML1 questions
  • Essential functions analysis
  • Technology & infrastructure review
  • Threat landscape assessment
  • Business continuity evaluation
SPF Full Assessment
Enterprise-Grade Cyber Risk Assessment
By Invitation

The complete SPF Pre-Loss Cyber & Operations Risk Assessment built on NIST and FAIR standards. Covers Data, Infrastructure, Operations, Users, and Cyber domains.

  • Includes all ML1 & ML2 questions
  • 5 comprehensive assessment sections
  • NIST CSF & FAIR aligned
  • Access code required
  • Full SPF scoring & roadmap

The SPF Philosophy

Maverick examines each client's security from the point of view of the adversary, integrated with foundational cyber-security from the NIST Cyber-security Framework (CSF). The SPF provides an easy-to-understand scoring method that works in a similar manner to sunscreen — the higher the number, the more secure the organization.

Because Maverick is product agnostic, we will never recommend a security product, service, or solution over another because we resell it. Recommendations are chosen solely for how well they will protect the client and improve cyber-security posture.