FAQ

What makes Cyway different from traditional cybersecurity consultancies?

We combine deep technical engineering expertise with executive-level strategy work. Our methodology links security directly to business priorities, so decisions are justified by risk reduction, ROI, and regulatory impact—not vague maturity scores.

How does Cyway approach AI security differently?

We treat AI as both an innovation accelerator and a new attack surface. Our services enable safe adoption of tools like ChatGPT and Copilot while helping you build secure custom AI systems aligned to OWASP AI Security and NIST AI RMF.

What is the CY360 Effective Security Program?

A structured, NIST CSF 2.0–aligned methodology that creates visibility, prioritizes actions based on business impact, and provides ongoing governance via checkpoints, KPIs, and an integrated ISMS/GRC tool.

How long does onboarding onto CY360 take?

Typically 3–5 weeks depending on stakeholder availability. The onboarding includes interviews, crown jewel validation, risk scenarios, technical spot checks, and full tool setup.

How does the AI Adoption service help organizations?

We identify concrete AI use cases, establish safe usage policies, help integrate AI tools securely, and build custom AI solutions with security, privacy, and governance built in from day one.

What is included in the AI Utilization offering?

Secure usage of ChatGPT, Copilot, Gemini and similar tools, plus data governance, DLP alignment, usage policies, guardrails, monitoring, and team training.

Do you build custom AI models or RAG systems?

Yes. We design and implement secure architectures for LLMs, retrieval-augmented generation, agents, and domain-specific AI systems, including compliance, privacy, and risk controls.

How does Cyway help with AI risk management?

We apply NIST AI RMF and real-world threat models to assess prompt injection, data leakage, model theft, bias, and other AI-specific risks, then define actionable controls and monitoring.

What is External Attack Surface Management / ransomware prevention and how does it work?

A focused assessment that checks your external and underground exposure, identity posture, DMARC status, backup readiness, and Microsoft Cloud configuration to reduce your chance of being shortlisted by ransomware gangs.

How often should an External Attack Surface / ransomware prevention check be run?

Most organizations choose 1–2 runs per year to track exposure changes, implement quick wins, and stay off threat actor radars.

Do you also support deeper ransomware resilience work?

Yes via additional verifications of your MS Cloud Security settings, your AI settings as well as hardening process across the kill chain such as SecOps topics and IR exercises.

What is included in the Microsoft Cloud Hygiene service?

A security verification of Entra ID, endpoint baselines, ASR, backups, sharing policies, license usage, and Defender/Sentinel posture, plus a prioritized improvement plan.

Do you support advanced Microsoft cloud projects?

Yes. We offer custom Azure governance, Zero Trust architecture, Purview deployments, detection coverage tuning, and SecOps automation.

What does the vCISO service cover?

Strategic cybersecurity leadership, risk management, regulatory alignment (e.g. NIS2, DORA), incident readiness, roadmap design, and executive steering—flexibly delivered T&M.

How is Cyway different from a typical vCISO?

Our vCISOs combine boardroom strategy with deep engineering experience. We can talk to the board in the morning and fix an Entra misconfiguration in the afternoon.

How do the CY360 Analytics services help?

We build insights for C-level visibility—KPIs, dashboards, SecOps metrics, cost optimization models, and data analyses that guide decisions instead of overwhelming with noise.

Is the CY360 platform secure for sensitive data?

Yes. It uses Zero Trust design, Entra-based authentication, strict tenant isolation, encryption in transit and at rest, immutable logs, and Swiss/EU data residency.

Who controls access to our CY360 instance?

You do. Authentication is through your own Microsoft Entra tenant, so MFA, Conditional Access, and access revocation remain under your full control.

Do Cyway services help with regulatory readiness?

Yes. CY360 supports GDPR, nFADP, NIS2, DORA, ISO 27001, and TiSAX. Our risk-based approach connects controls to regulatory impact for executive clarity.

Can Cyway help us define cybersecurity KPIs?

Absolutely. We design lean KPI and KRI sets aligned to NIST CSF 2.0 that reflect real risk reduction and executive decision needs rather than complex scorecards.

Do you work with small and mid-sized businesses?

Yes. Our services are designed for SMEs up to mid-market enterprises, providing high-value outcomes without requiring large in-house security teams.

How does pricing work for CY360 services?

Core packages are fixed-price and subscription-based. Custom services are T&M. Pre-commit volume gives discounts, and unused services expire after the defined period.

How are service checkpoints delivered?

Checkpoints are remote or onsite sessions summarizing threat radar, KPI changes, treatment progress, and critical decisions—delivered using the CY360 ISMS/GRC tool.

Can Cyway integrate with our existing security tools?

Yes. We integrate with Microsoft Cloud, SIEM/SOAR platforms, AI systems, and data sources via APIs or log ingestion to support analytics and program visibility.

Do you use AI in your service delivery?

Yes, in a controlled way. Data is pseudonymized or processed under strict agreements, never shared externally, and handled within EU/Swiss compliance boundaries.

How do you ensure executive buy-in during engagements?

We align recommendations with business outcomes—risk, revenue, compliance, and operational resilience—ensuring leadership can make informed decisions quickly.

Can we start with one service and expand later?

Yes. Most customers start with an External Attack Surface / ransomware prevent or AI Adoption check and later expand into Effective Security Program, Cloud Security, or vCISO support.

How does Cyway help reduce security spend?

By prioritizing actions with the highest risk-reduction-per-CHF, eliminating waste, optimizing licenses, and focusing on practical controls rather than theoretical frameworks.