myRISK.io – A next generation GRC that leverages machine learning, MITRE ATT&CK framework, NIST CSF, and FAIR to quantify cyber security risk in close to real-time.
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”RGBA(2,30,60,0.8)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Cybersecurity remediation planning is usually conducted annually or quarterly based on threat modelling. myRISK.io allows this process to be more accessible, consistent and timely – close to real time. As well as all the features of a GRC such as service and vendor assessments and risk management, myRISK.io uses machine learning of global threat actors and their techniques (based on the MITRE ATT&CK framework), a model of the architecture of each of your key services and their cyber control posture (in NIST, ISO or another taxonomy), as well as the FAIR (Factor Analysis of Informational Risk) model, to determine your next best control improvement or basket of improvements. myRISK.io can also integrate with cybersecurity metrics to do this in close to real time.
[/et_pb_text][et_pb_button button_url=”https://www.myrisk.io” button_text=”Learn More” _builder_version=”4.14.8″ _module_preset=”86f569c9-6436-475d-8dbd-47ab3259db09″ custom_button=”on” button_text_size=”14px” button_text_color=”#41E2BA” button_bg_color=”RGBA(0,0,0,0)” button_border_color=”#41E2BA” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” button_bg_color_last_edited=”off|desktop” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%22button_bg_color__hover%22%93}” button_bg_color__hover=”#446fee” button_bg_color__hover_enabled=”on|desktop” button_text_color__hover=”#FFFFFF” button_text_color__hover_enabled=”on|hover” button_bg_enable_color__hover=”on” sticky_enabled=”0″ url_new_window=”on”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-008.jpg” title_text=”data-science-008″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Feature” _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-056.png” title_text=”data-science-056″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#000000″ header_2_font_size=”54px” header_2_line_height=”1.35em” custom_margin=”||15px||false|false” custom_margin_tablet=”||10px||false|false” custom_margin_phone=”||5px||false|false” custom_margin_last_edited=”on|phone” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]TRUST.
SERVICE.
KNOWLEDGE.
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”RGBA(2,30,60,0.8)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]
myRISK.io is a SaaS implementation of our comprehensive myRISK® framework based on research cited in over 20 University papers and international frameworks.
It is a cost effective and scalable platform for internal / external consulting, assessments, risk management, program delivery, and resource management.
It is supported by our clickable consulting services using industry thought leaders with multiple certifications as well as the know how and experience to delivery best practice advice and achievable plans.
[/et_pb_text][et_pb_button button_url=”https://www.myrisk.io” button_text=”Learn More” _builder_version=”4.14.8″ _module_preset=”ce84040e-6a37-42c9-a745-357612d9501a” custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#41e2ba” button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}” button_bg_color__hover=”#000000″ button_bg_color__hover_enabled=”on|desktop” sticky_enabled=”0″ url_new_window=”on”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” admin_label=”How it Works” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#000000″ background_image=”https://cyberisk.net/wp-content/uploads/data-science-063.png” custom_padding=”120px||0px||false|false” custom_padding_tablet=”80px||||false|false” custom_padding_phone=”50px||||false|false” background_last_edited=”on|phone” background_enable_image_tablet=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”54px” header_2_line_height=”1.35em” max_width=”700px” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]
myRISK.io AI was developed in a project at the University of Wollongong.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|tablet” _builder_version=”4.9.10″ _module_preset=”default” custom_padding=”|||280px|false|false” custom_padding_tablet=”|||0px|false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-icon-teal-2.png” title_text=”data-science-icon-teal-2″ _builder_version=”4.9.10″ _module_preset=”default” max_width_tablet=”40px” max_width_phone=”32px” max_width_last_edited=”on|phone” global_colors_info=”{}”][/et_pb_image][et_pb_text _builder_version=”4.10.8″ _module_preset=”1d866de3-b108-4c5f-bed3-2da9506a6915″ header_font=”||||||||” header_4_font=”Roboto Mono||||||||” header_4_text_color=”#FFFFFF” header_4_line_height=”1.8em” custom_margin=”||0px||false|false” header_4_font_size_tablet=”16px” header_4_font_size_phone=”14px” header_4_font_size_last_edited=”on|tablet” locked=”off” global_colors_info=”{}”]Inputs
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”0d1dcb4c-f28c-4a41-972c-ecb508cfdc14″ text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Threat Actor strength, targets and preferences.
NIST CSF control effectiveness.
MITRE ATT&CK framework
Target Architecture
Analysis
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”0d1dcb4c-f28c-4a41-972c-ecb508cfdc14″ text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Threat Actor likely paths.
Threat events & success rates.
Controls & strength of resistance.
Control comparisons.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-icon-teal-3.png” title_text=”data-science-icon-teal-3″ _builder_version=”4.9.10″ _module_preset=”default” max_width_tablet=”40px” max_width_phone=”32px” max_width_last_edited=”on|phone” locked=”off” global_colors_info=”{}”][/et_pb_image][et_pb_text _builder_version=”4.10.8″ _module_preset=”1d866de3-b108-4c5f-bed3-2da9506a6915″ header_font=”||||||||” header_4_font=”Roboto Mono||||||||” header_4_text_color=”#FFFFFF” header_4_line_height=”1.8em” custom_margin=”||0px||false|false” header_4_font_size_tablet=”16px” header_4_font_size_phone=”14px” header_4_font_size_last_edited=”on|tablet” locked=”off” global_colors_info=”{}”]
Outputs
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”0d1dcb4c-f28c-4a41-972c-ecb508cfdc14″ text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_line_height=”1.8em” text_font_size_tablet=”” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Current LEF.
Best case LEF.
Optimal basket of controls.
Ranking of controls.
Return on Investment.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding_last_edited=”on|tablet” _builder_version=”4.9.7″ _module_preset=”default” custom_padding=”|||280px|false|false” custom_padding_tablet=”|||0px|false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”https://www.uow.edu.au/engineering-information-sciences/schools-entities/scit/” button_text=”UOW” _builder_version=”4.13.0″ _module_preset=”86f569c9-6436-475d-8dbd-47ab3259db09″ custom_button=”on” button_text_size=”14px” button_text_color=”#41E2BA” button_bg_color=”RGBA(0,0,0,0)” button_border_color=”#41E2BA” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” button_bg_color_last_edited=”off|desktop” locked=”off” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%22button_bg_color__hover%22%93}” button_bg_color__hover=”#446fee” button_bg_color__hover_enabled=”on|desktop” button_text_color__hover=”#FFFFFF” button_text_color__hover_enabled=”on|hover” button_bg_enable_color__hover=”on” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.7″ _module_preset=”default” width=”100%” max_width=”none” custom_padding=”||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”default” text_font=”Roboto Slab|700|||||||” text_text_color=”#FFFFFF” text_font_size=”20vw” text_line_height=”0.7em” header_4_text_color=”#FFFFFF” text_orientation=”center” locked=”off” global_colors_info=”{}”]
myRISK®
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.7″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-057.png” title_text=”data-science-057″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.7″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#000000″ header_2_font_size=”54px” header_2_line_height=”1.35em” custom_margin=”||10px||false|false” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]CYBERISK BUY-DOWN.
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”RGBA(2,30,60,0.8)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Using myRISK.io a cyber security risk manager is able to record control effectiveness using NIST, ISO or other frameworks, define and quantify risk scenarios, calculate inherent and current cyber risk, create risk profiles for services, vendors or business units, and periodically report risk buy-down associated with cyber security transformation initiatives.
[/et_pb_text][et_pb_button button_url=”https://www.myrisk.io” button_text=”Learn More” _builder_version=”4.14.8″ _module_preset=”ce84040e-6a37-42c9-a745-357612d9501a” custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#41e2ba” button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}” button_bg_color__hover=”#000000″ button_bg_color__hover_enabled=”on|desktop” sticky_enabled=”0″ url_new_window=”on”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.7″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.7″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#000000″ header_2_font_size=”54px” header_2_line_height=”1.35em” custom_margin=”|-72px|10px||false|false” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]CLOSE TO
Real-time QUANTIFICATION
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”RGBA(2,30,60,0.8)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]
Using myRISK.io, a cyber security specialist is able to assess cyber risk in close to real time, based on machine learning of the threat associated with various adversary actions (using the MITRE attack framework) against a model architecture, and the machine determined efficacy of countermeasures (mapped back to NIST CSF or ISO 27001 controls), quantified using Factor Analysis of Information Risk (FAIR).
[/et_pb_text][et_pb_button button_url=”https://www.myrisk.io” button_text=”Learn More” _builder_version=”4.14.8″ _module_preset=”ce84040e-6a37-42c9-a745-357612d9501a” custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#41e2ba” button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}” button_bg_color__hover=”#000000″ button_bg_color__hover_enabled=”on|desktop” sticky_enabled=”0″ url_new_window=”on”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-061.png” title_text=”data-science-061″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.7″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://cyberisk.net/wp-content/uploads/data-science-062.png” title_text=”data-science-062″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”|||-80px|false|false” custom_margin_tablet=”|||0px|false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” locked=”off” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#000000″ header_2_font_size=”54px” header_2_line_height=”1.35em” custom_margin=”||10px||false|false” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]CYBER REMEDIATION ROADMAP
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”RGBA(2,30,60,0.8)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Using myRISK.io, a Chief Information Security Officer is able to periodically conduct what-if analysis to determine the return on investment of a basket of control inprovements and develeop the optimal cyber security roadmap for the organisation.
[/et_pb_text][et_pb_button button_url=”https://www.myrisk.io” button_text=”Learn More” _builder_version=”4.14.8″ _module_preset=”ce84040e-6a37-42c9-a745-357612d9501a” custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#41e2ba” button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}” button_bg_color__hover=”#000000″ button_bg_color__hover_enabled=”on|desktop” url_new_window=”on” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Call to Action” _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ make_equal=”on” _builder_version=”4.9.10″ _module_preset=”default” width=”100%” max_width=”none” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”#41E2BA” custom_padding=”10vw|5vw|10vw|10vw|true|false” custom_padding_tablet=”|10vw||10vw|true|true” custom_padding_phone=”” custom_padding_last_edited=”on|phone” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%93}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”32021f09-dd67-47fb-8f9a-832b72a38baf” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”54px” header_2_line_height=”1.35em” max_width=”512px” max_width_tablet=”100%” max_width_phone=”” max_width_last_edited=”on|tablet” custom_margin=”||10px|0px|false|false” custom_padding=”|0px||0px||” header_2_font_size_tablet=”32px” header_2_font_size_phone=”16px” header_2_font_size_last_edited=”on|phone” locked=”off” global_colors_info=”{}”]myrisk®
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”2em” max_width=”512px” max_width_tablet=”100%” max_width_phone=”” max_width_last_edited=”on|tablet” custom_margin=”||40px||false|false” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Our services including governance, risk and cybersecurity frameworks; threat, risk & control assessments; cyber advisory; risk quantification and remediation planning; security architecture; M&A and vendor due diligence; control assurance; compliance and audit readiness; and cyber mentoring.
[/et_pb_text][et_pb_button button_url=”https://cyberisk.net/category/services/” button_text=”Our Services” _builder_version=”4.13.0″ _module_preset=”4ba1de81-9846-41be-926c-ba5f0bb02be9″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#000000″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%22button_bg_color__hover%22%93}” button_bg_color__hover=”#446fee” button_bg_color__hover_enabled=”on|hover” button_text_color__hover=”#41E2BA” button_text_color__hover_enabled=”on|hover” button_bg_enable_color__hover=”on” sticky_enabled=”0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.10″ _module_preset=”default” background_image=”https://cyberisk.net/wp-content/uploads/data-science-016.jpg” parallax=”on” global_colors_info=”{}”][et_pb_divider show_divider=”off” _builder_version=”4.9.10″ _module_preset=”default” min_height_tablet=”60vw” min_height_phone=”60vw” min_height_last_edited=”on|phone” global_colors_info=”{}”][/et_pb_divider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Logos” _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ _module_preset=”default” background_image=”https://cyberisk.net/wp-content/uploads/data-science-064.png” background_position=”top_center” custom_padding=”||8vw||false|false” saved_tabs=”all” locked=”off” global_colors_info=”{}”][et_pb_row custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#000000″ background_enable_image=”off” max_width=”700px” max_width_last_edited=”off|desktop” custom_padding=”100px|100px|30px|100px|false|true” custom_padding_tablet=”60px|60px||60px|false|true” custom_padding_phone=”30px|30px|10px|30px|false|true” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” locked=”off” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.9.7″ _module_preset=”8e8d9bcd-685d-4329-882b-a86608a6c40b” header_text_color=”#FFFFFF” header_2_font=”Roboto Slab||||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”80px” header_2_line_height=”1.2em” header_2_font_size_tablet=”40px” header_2_font_size_phone=”20px” header_2_font_size_last_edited=”on|phone” global_colors_info=”{}”]Get Started with
MYRISK.IO
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”#FFFFFF” text_font_size=”16px” text_line_height=”2em” max_width=”512px” custom_margin=”||40px||false|false” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]
Contact us today to register for our early adopter program
[/et_pb_text][et_pb_button button_url=”https://cyberisk.net/contact/” button_text=”Get in Touch” button_alignment=”right” _builder_version=”4.13.0″ _module_preset=”4ebb5d01-8f2a-40d2-99f6-c69d0bb85164″ custom_button=”on” button_text_size=”14px” button_text_color=”#FFFFFF” button_bg_color=”#41E2BA” button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”3px” button_font=”|700||on|||||” button_icon=”E||divi||400″ custom_margin=”40px|-100px|||false|false” custom_margin_tablet=”|-60px|||false|false” custom_margin_phone=”|-30px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”18px|30px|18px|30px|true|true” custom_padding_tablet=”16px|25px|16px|25px|true|true” custom_padding_phone=”14px|20px|14px|20px|true|true” custom_padding_last_edited=”on|phone” animation_style=”slide” animation_direction=”bottom” animation_duration=”600ms” animation_intensity_slide=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”12px” button_text_size_last_edited=”on|phone” locked=”off” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%93}” button_bg_color__hover=”#FFFFFF” button_bg_color__hover_enabled=”on|hover” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|hover” button_text_color__hover=”#41E2BA” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#000000″ max_width=”700px” custom_padding=”30px|100px|80px|100px|false|true” custom_padding_tablet=”|60px|60px|60px|false|true” custom_padding_phone=”10px|30px|30px|30px|false|true” locked=”off” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_font_size=”16px” text_line_height=”2em” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]13-000-CYBER
[/et_pb_text][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_font_size=”16px” text_line_height=”2em” link_text_color=”#FFFFFF” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{%22gcid-98d90e25-2ae4-4d27-95a6-0d39ba22d29e%22:%91%93}”]info@cyberisk.net
[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.7″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.10.8″ _module_preset=”16a54059-cc81-4572-9c70-eda6a6c419bf” text_font=”|600|||||||” text_text_color=”rgba(255,255,255,0.7)” text_font_size=”16px” text_line_height=”2em” custom_padding=”3px|||3px||” text_font_size_tablet=”15px” text_font_size_phone=”13px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”” text_line_height_phone=”1.7em” text_line_height_last_edited=”on|phone” header_font_size_tablet=”55px” header_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}”]Cyberisk Australia
Tank Stream Labs
Level 4, 17-19 Bridge Street
Sydney NSW 2000
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]