Every business has unique cybersecurity requirements. Large or small, your digital infrastructure is an attractive target for cybercriminals. Data breaches, ransomware attacks, and other forms of cyber threats can be devastating for your business, affecting not only your bottom line but also your reputation. Protect your assets with our comprehensive Cyber Risk Assessment service, meticulously designed to cater to businesses of varying sizes and risk profiles.


During an ISO27001 program, we examine your IT security. We compile our findings in a comprehensive report and a practical action plan that can significantly improve your information security maturity in the short term. If our report shows that you’re ready for an ISO27001 certification, you can confidently request an audit from a certifying body.

Our Cyber Risk Assessment service is based on the CIS Controls framework’s Implementation Groups. We offer three distinct packages – Starter, Advanced, and Complete – ensuring you get exactly the protection you need.

1. Starter Package (IG1) – 5999€ excl. VAT

Ideal for small businesses or organizations with limited resources, our Starter package focuses on the most crucial controls, providing a robust foundation for cybersecurity. This package includes:

  • Assessment of Basic Controls: We’ll evaluate the implementation of the first six CIS Controls, ensuring your business has fundamental security measures in place.
  • Identification of Vulnerabilities: Our team will pinpoint vulnerabilities within your digital infrastructure and recommend practical steps to mitigate them.
  • Compliance Consultation: Our experts will help your business understand and work towards compliance with relevant regulations and industry standards.

2. Advanced Package (IG2) – 8999€ excl.VAT

Tailored for medium-sized businesses with moderate risk exposure, the Advanced package includes everything in the Starter package, plus:

  • Assessment of Foundational Controls: We’ll evaluate the implementation of CIS Controls 7 to 16, addressing more advanced security measures for comprehensive protection.
  • Advanced Vulnerability Scanning: We’ll perform a thorough vulnerability scan of your network, web applications, and digital assets to identify and prioritize areas for improvement.
  • Security Policy Review and Development: We’ll examine your existing security policies and help develop new ones to align with industry best practices and regulatory requirements.
  • Implementation Assistance: Our experts will assist your team in implementing the recommended security measures, ensuring a smooth and efficient process.

2. Complete Package (IG3) – 12999 excl.VAT

Our Complete package is designed for large organizations or businesses with high risk exposure. It includes everything in the Advanced package, plus:

  • Assessment of All 20 CIS Controls: We’ll evaluate the implementation of all 20 CIS Controls, providing a comprehensive overview of your organization’s cybersecurity posture.
  • In-Depth Penetration Testing: We’ll conduct thorough penetration testing to identify vulnerabilities and test the effectiveness of your security measures.
  • Incident Response Planning: Our experts will help your team develop and implement an effective incident response plan, ensuring your business is prepared to handle potential cyberattacks.
  • Ongoing Support and Guidance: You’ll receive ongoing support from our team to address emerging threats and continuously improve your organization’s cybersecurity measures.
  • Cybersecurity Tailored to Your Needs

No matter your business size or risk profile, BlackLynx provides a cybersecurity audit package to suit your needs. Our commitment to securing your digital presence, combined with our expertise in implementing the CIS Controls framework, ensures industry-leading protection and guidance. Choose the package that best fits your organization and start enhancing your cybersecurity posture today.


Take the initiative, outsmart criminals, and secure your business. Get in touch with us today to learn more.

  • Trusted by the top
  • Proven methodology
  • Open communication
  • Absolute discretion
  • Certified experts

Contact us