- Interview stakeholders to identify and confirm the business risk appetite, tolerance, capacity, specific organisational goals and objectives
- Verify assets and existing resources to confirm information assets, asset owners, sensitivity, location and current capabilities
- Review information security procedures, policies, KRI’s, controls, control objectives, KPIs, evidence and testing activities
- Conduct sample (random) staff interviews to benchmark the current information and cyber risk awareness culture
