Cybersecurity continues to be a hot topic, with news alerts about data breaches and cyber attacks popping up almost every day. Staying ahead of these ever-increasing threats, dealing with the growing complexity of compliance: itโs no wonder that many organizations across industries are left feeling overwhelmed. As they grapple with these continuous and ever-growing threats, they want to know where their cybersecurity stands.
A comprehensive cybersecurity assessment is a proven method to achieve this. But how exactly does such an assessment work, and why is it vital to safeguarding your business?

To gain insight, we sat down with Tim Timmermans, CISO at ON2IT, whose team leads the cybersecurity assessments. He is giving us an insiderโs perspective on how these assessments work and why they matter.
Letโs start with a logical first question: why are cybersecurity assessments relevant? What is their purpose?
โAt its core, cybersecurity assessments are about creating alignment,โ says Timmermans. โToo often, organizations dive into security initiatives without a solid strategy or considering the full context. This can lead to security and business operating in silos rather than supporting each other. A good cybersecurity assessment creates explicit clarity and a clear direction on where the business is going and the role that security has in this as a business enabler.โ
Tim emphasizes another aspect: โIn addition, a cybersecurity assessment creates alignment between strategic, managerial and operational levels. Multiple disciplines and organizational layers should be involved, such as C-level executives, architects and even experts. Getting different positions and departments on the same page helps build mutual understanding and breaks down communication and decision-making barriers.โ
So, what does an ON2IT cybersecurity assessment look like?
“Our assessments are highly interactive and collaborative,” Tim begins. โPractically speaking, we use a structured approach where participants engage with a series of statements and collectively score the organizationโs maturity on key cybersecurity topics. Think of your security governance, compliance, strategic planning but also architecture and operational capabilities like continuous monitoring and incident response.โ
โWhatโs particularly interesting is that by bringing people from different departments and layers of the organization around the table, we can visualize and discuss variability in real-time. It highlights consensus, but also where perspectives differ or where misconceptions exist.โ
Tim explains that whereas many cybersecurity assessments focus on strategy, architecture, or technique in isolation, ON2ITโs approach integrates all three. “We ground every assessment in Zero Trust principles,โ he notes, โwhich allows us to provide a comprehensive gap analysis and a prioritized roadmap aligned with each organizationโs needs.”
The process doesnโt end with the assessment itself. “We conclude with a workshop where we take a deep dive into some of the organizationโs critical assets,” Tim adds. “This step helps teams understand Zero Trust concepts in a tangible way and ensures they leave with actionable insights.”
How does it differ from any other cybersecurity assessment?
โFirst,โ Tim starts, โour assessments go well beyond ticking boxes. We foster meaningful discussions that drive organizational alignment. Many participants are pleasantly surprised by the new collaborations and perspectives that are sparked by these sessions.โ Tim continues, “Whenever possible, we prefer to conduct our assessments in person, though we can also work remotely if needed. We involve participants from across the enterprise: strategic leaders like CIOs and CISOs, managerial staff, operational experts, and even board members.โ
โPeople naturally view cybersecurity through their own lens,โ Tim observes. โStepping outside that perspective to see the bigger picture is invaluable. Participants frequently describe it as an eye-opener.โ Bringing diverse stakeholders together creates new opportunities for collaboration. โThey learn from each other and begin linking their work to broader organizational goals,โ Tim explains.
Second, ON2IT focuses on improving security from a Zero Trust perspective. โZero Trust isnโt just a technology; itโs a strategy. Weโve been refining our methodology for years and have deployed this successfully all over the world in organizations of all sizes and maturities.”
Tim points out that peopleโs expectations can differ significantly: particularly when it comes to Zero Trust, a key component to the cybersecurity assessments at ON2IT. โEveryone interprets Zero Trust in their own way,โ he explains. โThatโs why we invest time up front to clarify objectives and define what โZero Trustโ actually means in the context of their organization. Once that groundwork is laid, participants are often surprised by how quickly the process moves forward.โ
Involving all organizational layers is another key differentiator. โStrategic initiatives like Zero Trust succeed when everyone, from C-suite to frontline teams, aligns with the same security objectives. Itโs vital to avoid the trap of treating cybersecurity as merely an IT responsibility.โ
“Some people will say, โI could go through audits and assessments every day – do I really need yet another?โ” Tim understands that frustration. “This assessment is about taking meaningful steps forward and bringing together actual practitioners from your company to discuss the nuts and bolts.”
Tim highlights that the process includes defining protect surfacesโthe “crown jewels” of the organizationโand collaborating with stakeholders to establish practical Zero Trust measures. “Itโs not just evaluation; itโs the beginning of implementation.” A practical advantage of the assessment is its compliance mapping. “Zero Trust measures we recommend align with over 170 compliance frameworks. This makes it easier for organizations to adopt a risk-driven approach rather than chasing isolated compliance goals. Many participants are impressed by how this approach streamlines their efforts.”
Lessons from past assessments
With years of experience and over 100 assessments under his belt, Tim has learned numerous valuable lessons when it comes to cybersecurity assessments.
โCybersecurity has implications for the entire organization. This is why we keep re-itering that itโs important to get stakeholders from all across the organization on board. Especially having C-level โon your sideโ helps bridge security and business functions and ensures that cybersecurity gets the attention and support it needs throughout the entire organization.โ
Another key thing to remember is that no organization will be starting from scratch when it comes to improving their cybersecurity. Existing frameworks and initiatives are likely already in place, which is incredibly helpful, but also a point of concern. โThe idea of starting from scratch, especially when thereโs already some sort of system in place, can be daunting. Itโs important to remember that many organizations will, knowingly or not, already have some Zero Trust-based structures in place. These are a great starting point to boost Zero Trust adoption and logical follow-up actions, which the assessment will help determine.โ
Itโs not realistic to overhaul the entire enterprise in one go. โWe typically recommend starting small and focusing on a few segments of your infrastructure, rather than tackling everything at once. Youโd be amazed how small, targeted improvements can make real impact.โ
โUltimately,โ Tim emphasizes, โwe want to focus on the practical side of things. Implementation is key: start small, iterate and improve as you go. Keep continuing to make progress.โ
Final Thoughts
Cybersecurity assessments shouldnโt be โjust another check-the-box exerciseโ. With the right approach, they can spark meaningful change and pave the way for sustainable cybersecurity improvements.
As Tim puts it, “Cybersecurity assessments are about building a foundation for lasting security enhancements.” He does point out that they will always be snapshots in time. โOrganizations, risks, and the broader threat landscape are constantly evolving. Assessments should be used not just to measure progress, but to stay adaptive and ensure that security improvements keep pace with that constant change.โ

