The power of conducting assessments and inspections … The basis for spending any money (resources) on cybersecurity is understanding what information you’re trying to protect. Obviously, some information is more important than others and could be regulated. Answering various questions about how vulnerable that information (the important and regulated ones) is to potentially being exposed, is the key to setting an overall cybersecurity strategy. An assessment will provide a list of factors that influence vulnerability. Things such as network infrastructure, trade secrets, customer data, access, asset management, and other factors are weighted which set priorities. We apply a score in order to measure the actions that will make the greatest impact on improving that number. Inspections are designed to establish a course of action, work plan if you will, that can be followed to address compliance, education, or infrastructure needs.