Skip to main content

Cyber Assessments

QuietAudit® Cyber Assessments

A digital padlock illustration with a glowing blue, wireframe design on a dark background.

If you are worried about the security of your network, NetDiligence offers our members three different levels of cyber assessments to ensure your cybersecurity.

For members that complete a Health Check or CFO assessment and meet certain criteria, the CSD Pool offers a higher cyber sublimit of $1 million at no additional cost. Sublimits are also available up to $3 million. Standard deductible still applies.

Assessment Types

  1. Health Check Assessment – A best practices conversation
    • Review of any prior audit materials or applications
    • Client IT Security Phone Interview to maximize efficiency
    • NetDiligence prepares customized outline for discussion with client IT security reps including any third-party vendor if the client outsources IT
    • Risk Manager Summary Report
  2. Vulnerability Scan – Test your public facing presence for weaknesses
    • Network/ Website Vulnerability Scan Test
    • Risk Manager Summary Report
    • Interpretive Summary
  3. CFO Assessment – A combination of Heath Check Assessment and Vulnerability Scan

Pricing & Grant Information

While the assessments range in price, the cost of a Cyber Assessment can be partially reimbursed with our Safety Grant program.

We are offering a limited number of grants to cover the costs of a NetDiligence QuietAudit Health Check (a $3,500 value). If you are interested in applying, please fill out our Request Form. Recipients will be selected based on merit and availability.

If you are interested in a cyber assessment or grant funding, please reach out to us at info@csdpool.org

Additional Details

To qualify for the higher sublimit with the CSD Pool, members must earn an acceptable score on NetDiligence’s assessment, which is provided to the CSD Pool.

In addition, we require an annual copy of the minutes from a meeting of the Board of Directors that illustrates:

  1. The discussion of the exposure to Personally Identifiable information (PII)
  2. Progress made
  3. Next steps taken