We combine a life-cycle model and a risk-based approach.

work Process


(678) 590-8748

Our Purpose Is To Be Your Trusted Partner

Our process was defined and honed over hundreds of engagements. Our goal is to clearly understand the context of the data that you are trying to protect. We utilize a life-cycle centric approach to help build a solid foundation that can apply to any security program or compliance initiative across varying organizations and industries. Using this life-cycle model combined with a risk-based approach, we can provide you with a road-map leading to stronger cyber security and risk management. Our methods and documentation give our clients complete confidence that assessments are performed to the highest of standards.

Work Process

A typical engagement will include the following phases:

Discovery & Analysis

Project Initiation


Report & Recommend


Discovery and Analysis

Project Initiation

Identify Customer Requirements

Align to Compliance Initiatives

Develop Project Approach and Plan

Create Scope of Work

Project Kickoff Meeting

Review Statement of Work and requirements

Establish rules of engagement

Identify critical staff involvement

Schedule interviews and Technical Tests


Report and Recommend

Interview designated personnel

Perform technical testing

Review findings from interviews and testing

Consolidate into risk model and score as appropriate

Perform gap analysis

Deliver Final Report and Presentation

Executive summary

Key findings

Security roadmap

Prioritized Recommendations and Guidance


new malware samples are created per day



of companies targeted by ransomware attacks have been infected


records stolen from security breaches per day



of the health care industry infected with malware over last year

Want to work with us?

Start Project


© copyright Relify Security 2018 | All Rights Reserved