Many security assessments result in hundreds of findings that are presented to organizations as a long ‘to do’ list. This is not a practical approach when dealing with the complex infrastructures of today. Our cybersecurity SMEs work with organizations to understand business goals and security risks first, to enable the development of customized roadmaps and action plans which group recommendations into logical, prioritized projects focused on business priorities.

Having worked with the National Institute of Standards and Technology (NIST) and the Capability Maturity Model Integration (CMMI) Institute in developing leading frameworks, standards, and platforms, G2 is uniquely positioned to understand the intent of industry standards and guidance and leverage this experience to help organizations to effectively implement cybersecurity protections to support their business goals. To achieve these goals, G2 performs the following risk-based assessments:

  • Cybersecurity Assessments
  • Cybermaturity Assessments
  • Technical Assessments
  • Supply Chain Assessments

G2 strives to help organizations build cybersecurity into existing business practices whenever possible to increase efficiency and maximize resources. Our team prides itself in providing meaningful and actionable results that enable your organization to succeed. To find more information about G2 and our services send us an email at or give us a call at (301) 575-1830.

Cybersecurity Assessments

G2’s Cybersecurity SMEs leverage industry standards such as NIST SP 800-53, ISO 27001, and the NIST Cybersecurity Framework to assist organizations by creating customized security assessments. Through this customized assessment, G2 can ensure that all necessary requirements and regulations are addressed simultaneously resulting in a clear representation of the organization’s overall security.

Our team evaluates the organization’s current security and provides recommendations for increasing the operational security of the organization. At the completion of the security assessment, organizations are better prepared for security audits and understand what needs to be done to prevent cyber-attacks.

Cybermaturity Assessments

G2 cybersecurity experts collaborated with the CMMI Institute to develop the industry standard for measuring cybersecurity maturity through the CMMI Cybermaturity Platform. This standard has now been leveraged to build cybersecurity resilience, readiness, and board confidence in the world’s first cybersecurity capability maturity management platform, the CMMI Cybermaturity Platform.

G2 will work with your organization to conduct a risk discussion and assess your cybersecurity capabilities using the CMMI Cybermaturity Platform to create a risk profile, define current & target cybermaturity levels, generate a risk-based cybersecurity maturity roadmap, and align to a common set of standards & frameworks. For more information on how G2 can help your organization measure your cybermaturity, see our cybermaturity assessment.

Technical Assessments

G2’s Cybersecurity Subject Matter Experts (SMEs) assist organizations in performing technical assessments such as vulnerability assessments and penetration tests by leveraging leading industry tools (e.g. Nessus, Kali, etc.) as well as creating customized scripts and scanning tools specifically for your infrastructure.

G2’s recommendations do not simply provide results from scanning tools- our cybersecurity engineers analyze vulnerabilities and findings to not only address the issue discovered, but also include guidance on developing an operational process to ensure the issues aren’t recreated in the future.

Supply Chain Assessments

G2 has assisted organizations in understanding their current cybersecurity posture as well as the risk imposed by suppliers. Our cybersecurity SMEs can evaluate your vendors to understand the technical and operational risk they pose to your environment.

In support with your vendors, our team leverages the NIST Cybersecurity Framework to customize a vendor based security assessment for evaluating a vendor’s cybersecurity program. The results of our supplier based security assessment can assist in identifying mitigation requirements you can implement in your infrastructure, provide guidance to the vendor for securing their connection into your environment, and demonstrate how the vendor’s cybersecurity posture aligns with your organizational defined cybersecurity goals.

Contact Us

Tom Conkle

Commercial Lead / Cybersecurity Engineer

© G2 Inc.