playQuickstart

Get Value in Days, Not Months

🎯 Objective

This Quickstart guide helps you activate the platform, gain immediate visibility, and start reducing risk within your first days of use.

By following these steps, you will:

  • Establish a centralized risk view

  • Identify your most critical exposures

  • Begin building a resilient security culture

  • Create momentum toward continuous risk management


🧭 Step 1: Platform Setup & Access

βœ”οΈ What to Do

  • Create your organization profile

  • Define basic company information

  • Assign core roles:

    • Platform Admin

    • CISO / Security Owner

    • Risk Owners

🎯 Outcome

A structured foundation for governance, accountability, and reporting.


🧠 Step 2: Complete Baseline Security Questionnaire (Auto-Fill AI)

This step establishes your initial security posture using AI-driven automation.

βœ”οΈ What to Do

  • Launch & complete the Baseline Security Questionnaire

  • View your organization security score in page "Security Profile"

  • After that Auto-Fill AI will be able to:

    • Pre-populate answers based on your inputs, documents, and platform context

    • Identify gaps and inconsistencies

  • Review and validate AI-generated responses

πŸ€– How Auto-Fill AI Helps

  • Reduces manual effort and time

  • Ensures consistency across answers

  • Highlights missing controls and weak areas

  • Accelerates time-to-value

🎯 Outcome

A validated baseline security assessment that automatically feeds:

  • Initial risk entries into ERM

  • Compliance insights into GRCM

  • Prioritized focus areas for remediation


🌐 Step 3: Enable External Attack Surface Management (EASM)

βœ”οΈ What to Do

  • Add your primary domain

  • Start automated external asset discovery

  • Review newly discovered assets and exposures

🎯 Outcome

Immediate visibility into your external digital footprint and unknown exposures.


🧩 Step 4: Onboard Your First Vendors (TPRM)

βœ”οΈ What to Do

  • Add your critical vendors

  • Assign vendor risk tiers

  • Send the first security questionnaire

🎯 Outcome

Visibility into third-party risk and compliance gaps that could impact your organization.


🧬 Step 5: Launch Security Culture

βœ”οΈ What to Do

  • Invite employees to the platform

  • Launch baseline security awareness training

  • Run your first phishing simulation

🎯 Outcome

Measured insight into human risk and employee readiness.


πŸ“Š Step 6: Review Dashboards, Insights & Take Action

βœ”οΈ What to Do

  • Review the executive dashboard

  • Identify:

    • Top external risks

    • High-risk vendors

    • Human risk trends

  • Assign mitigation tasks

🎯 Outcome

Clear, prioritized actions with ownership and deadlines.


πŸ”„ Step 7: Enable Continuous Improvement

βœ”οΈ What to Do

  • Schedule periodic reassessments

  • Enable alerts for critical changes

  • Track risk reduction over time

🎯 Outcome

A continuous, automated security lifecycle rather than one-time assessments.


πŸš€ What You Achieve in the First 7 Days

  • βœ… Centralized enterprise risk register

  • βœ… Full visibility into external exposure

  • βœ… Initial third-party risk posture

  • βœ… Measured phishing and awareness baseline

  • βœ… Executive-level security insights


🧠 Best Practices for Success

  • Start with visibility, not perfection

  • Focus on critical risks first

  • Use automation wherever possible

  • Review dashboards weekly at leadership level

  • Treat security as a continuous process


🧩 What’s Next?

Once Quickstart is complete, you can:

  • Mature phishing and awareness programs

  • Add advanced compliance frameworks

  • Integrate threat intelligence

  • Prepare for audits and certifications

Start small. Gain visibility. Reduce risk. Scale securely.

Last updated