Client Information
First Name
*
Last Name
*
Phone
*
Email
*
Date of Consultation
Team Structure & Tools
Which tools do you rely on daily—like firewalls, SIEM platforms, or endpoint solutions?
How is your cybersecurity team set up? What are each person's roles, certifications, and key strengths?
Incident Response & Operations
How confident are you in your current incident response playbook?
Training & Skill Development
How do you track progress or measure skill growth over time?
What kind of training or exercises (cyber ranges, tabletop drills) does your team do to stay sharp?
Time & Resource Management
Are there constraints—like budget or staffing—that limit training and readiness?
How do you balance day-to-day tasks with cybersecurity training?
Compliance & Risk Areas
How do you prioritize and budget for fixing those issues?
Are you aware of any compliance or regulatory gaps that concern you?
Security Technologies
Are there any operational gaps that make responding to incidents more difficult?
Which firewall, SIEM, or security monitoring tools are currently protecting your environment?
Consent & Acknowledgment
Signature Date
Name & Title
Client Signature
*
Clear
Sign in the box above using your finger, stylus, or mouse.