Question Title

* 1. Does your Organization have a documented, agency-wide cybersecurity policy?

Question Title

* 2. To what extent have you implemented the NIST Cybersecurity Framework (CSF), NIST 800-53, or a similar recognized framework (e.g., CIS Controls)?

Question Title

* 3. Does your organization have a formally documented incident response plan?

Question Title

* 4. How would you rate your organization’s current ability to quickly restore critical services following a cyberattack?

Question Title

* 5. What are the top cybersecurity threats your organization currently faces? (Select up to 3)

Question Title

* 6. Which types of systems are most vulnerable in your environment?

Question Title

* 7. Does your organization regularly conduct automated scanning or penetration testing to identify external vulnerabilities?

Question Title

* 8. To what extent does your organization maintain a comprehensive and up-to-date inventory of all public-facing assets (e.g., websites, servers, remote access portals)?

Question Title

* 9. How would you describe your organization’s inventory of OT (e.g., SCADA, PLC) and IoT devices (video cameras, conference room equipment, VOIP phones, etc.)?

Question Title

* 10. Are OT and IT networks at your agency segmented from one another?

Question Title

* 11. How frequently are firmware and software patches applied to your OT and IoT devices?

Question Title

* 12. What are your top three biggest challenges in securing your OT and IoT environment? (number as 1 for biggest challenge, 2 for second, 3 for third)

Question Title

* 13. How is remote access to your organization’s internal networks and applications managed?

Question Title

* 14. How does your organization manage remote access for third-party vendors or contractors (e.g., equipment manufacturers, maintenance providers)?

Question Title

* 15. Do you use a "just-in-time" or "least privilege" approach for remote access, where permissions are granted only when needed and for a limited duration?

Question Title

* 16. Which strategies have proven successful in mitigating cybersecurity concerns around critical infrastructure resilience? Tick your top three.

Question Title

* 17. What is the single most important action your organization plans to take in the next 12 months to improve your cybersecurity posture? (Open-ended)

T