Ready or Not: A Ransomware Self-Assessment

Fill out Bishop Fox’s ransomware self-assessment to see how your program stacks up to rigorous offensive security preparation.

Ransomware readiness self-assessment guide cover and 2 white pages showing a questionnaire and one purple and black cover page with a maze and blue writing Ransomware self Readiness guide. All on dark purple to black background.

Evaluating Readiness for Ransomware Attacks

To assess if your organization is prepared to shut down ransomware attacks, we’ve assembled questions to help you evaluate your readiness level.

Our interactive, downloadable self-assessment focuses on four key areas: vulnerability discovery, asset management, detection and response improvement, team cohesion.

A quick look at some of the questions we include:

  • When was the last time you ran internal and external penetration tests?
  • What assets do you anticipate are the most at risk of a ransomware attack?
  • When was the last time you tested your ability to detect specific TTPs?
  • What specific steps you’ll take once ransomware is detected in your environment?


Trevin Edgeworth

About the author, Trevin Edgeworth

Red Team Practice Director

Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading best-in-class adversary emulation services to help customers of all sizes and industries strengthen their defenses against current and emerging threats.

Trevin has over 20 years of security experience; he has built and overseen red team programs for several Fortune 500 companies, including American Express, Capital One Financial, and Symantec Corporation. Other accomplishments include leading a security organization as Chief Security Officer (CSO) for a major security company. Trevin has led a variety of security functions in his career, including cyber threat intelligence, hunt, deception, insider threat, and others.

Trevin is an active member of the security community. He has presented at several industry conferences and been interviewed by leading publications on topics such as red teaming and threat intelligence.

More by Trevin

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.