Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • Cyrisma MSP Dashboard
  • Home

The Cyber Risk Assessment Process

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • API Documents
  • Support Ticket SLA
  • Billing Questions
+ More

The Cyber Risk Assessment Process

This is CYRISMA’s recommended deployment path—designed to guide you through a complete security evaluation from start to finish. Follow step-by-step instructions to create instances, deploy agents, run scans, configure monitoring tools, and generate comprehensive risk reports. Ideal for onboarding new clients or performing recurring assessments with consistency and clarity.

  • CYRISMA Quick Start Guide
  • CYRISMA CyBroker Sensor Preparation and Setup
  • How to Create a Client Instance
  • How To Create an External IP Scan
  • How to Create an External Web Application URL Scan
  • How to use Network Discovery to find Targets
  • How To Create an Internal Authenticated Vulnerability Scan
  • How To Create an Internal Unauthenticated Vulnerability Scan
  • How to Create a Data Scan
  • How To Create a Secure Baseline Scan
  • How to setup a Dark Web Monitor
  • How To Generate a Cyber Risk Assessment Report
  • How To Setup Microsoft Secure Score
  • How to Create a Compliance GRC Assessment
  • How to Use Industry Comparison and vCISO Services

Popular Articles

  1. How to Deploy CYRISMA Agents via PowerShell
  2. CYRISMA Agent Installation Guide
  3. Scan Agents
  4. How to Install the CYRISMA Agent for Mac OS
  5. CYRISMA Quick Start Guide
  6. Provisioning and Reporting API Guide
  7. Overall Risk Dashboard
  8. How to Uninstall the CYRISMA Agent
  9. Halo PSA Integration Guide
Expand