www.cybersaint.io
Open in
urlscan Pro
199.60.103.228
Public Scan
Submitted URL: https://content.cybersaint.io/e3t/Ctc/WZ+113/ct02K04/VVnFsk4by8_CW2wzMnq8Vql5VW2K0rfL5bVLZjN2dmMxz3qgyTW8wLKSR6lZ3kSW1st02N2X4...
Effective URL: https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis?utm_campaign=Q1-24&utm_medium=email&_hsmi=29903144...
Submission: On March 20 via manual from CA — Scanned from CA
Effective URL: https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis?utm_campaign=Q1-24&utm_medium=email&_hsmi=29903144...
Submission: On March 20 via manual from CA — Scanned from CA
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3936746/fd871f11-3a44-4919-9058-62e166ca1116
<form id="hsForm_fd871f11-3a44-4919-9058-62e166ca1116_7632" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3936746/fd871f11-3a44-4919-9058-62e166ca1116"
class="hs-form-private hsForm_fd871f11-3a44-4919-9058-62e166ca1116 hs-form-fd871f11-3a44-4919-9058-62e166ca1116 hs-form-fd871f11-3a44-4919-9058-62e166ca1116_87b13eec-a889-4fb4-a88d-c9ed87994d0d hs-form stacked hs-custom-form"
target="target_iframe_fd871f11-3a44-4919-9058-62e166ca1116_7632" data-instance-id="87b13eec-a889-4fb4-a88d-c9ed87994d0d" data-form-id="fd871f11-3a44-4919-9058-62e166ca1116" data-portal-id="3936746"
data-test-id="hsForm_fd871f11-3a44-4919-9058-62e166ca1116_7632">
<div>
<div class="hs-richtext hs-main-font-element">
<p><span style="font-size: 11pt; color: #000000; background-color: transparent; font-weight: 400; text-decoration: none; vertical-align: baseline;">Instantly access your top industry risks and related controls in just 3 clicks, powered by
patented AI and the largest cyber loss dataset in the world.</span></p>
</div>
</div>
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-fd871f11-3a44-4919-9058-62e166ca1116_7632" class="" placeholder="Enter your First Name"
for="firstname-fd871f11-3a44-4919-9058-62e166ca1116_7632"><span>First Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-fd871f11-3a44-4919-9058-62e166ca1116_7632" name="firstname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-fd871f11-3a44-4919-9058-62e166ca1116_7632" class="" placeholder="Enter your Last Name"
for="lastname-fd871f11-3a44-4919-9058-62e166ca1116_7632"><span>Last Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-fd871f11-3a44-4919-9058-62e166ca1116_7632" name="lastname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-fd871f11-3a44-4919-9058-62e166ca1116_7632" class="" placeholder="Enter your Email"
for="email-fd871f11-3a44-4919-9058-62e166ca1116_7632"><span>Email</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-fd871f11-3a44-4919-9058-62e166ca1116_7632" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-fd871f11-3a44-4919-9058-62e166ca1116_7632" class="" placeholder="Enter your Name Your Instance (ex: "My Company Name")"
for="company-fd871f11-3a44-4919-9058-62e166ca1116_7632"><span>Name Your Instance (ex: "My Company Name")</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-fd871f11-3a44-4919-9058-62e166ca1116_7632" name="company" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
<div class="hs_recaptcha hs-recaptcha field hs-form-field">
<div class="input">
<div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-ok757uxz0np3" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&co=aHR0cHM6Ly93d3cuY3liZXJzYWludC5pbzo0NDM.&hl=en&v=YurWEBlMIwR4EqFPncmQTkxQ&size=invisible&badge=inline&cb=io4gokmhujr"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="">
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1710935567564","formDefinitionUpdatedAt":"1709147465714","lang":"en","embedType":"REGULAR","disableCookieSubmission":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36","pageTitle":"Get Your Free Cyber Risk Analysis","pageUrl":"https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis?utm_campaign=Q1-24&utm_medium=email&_hsmi=299031449&_hsenc=p2ANqtz--Gmj49wfB5L-pF9HrOLtCQ64VcOXeB4_89ZjuBbBgBLbKiuyLiErblDBWGhpiwrYUJQkpkBwZt9ip6uguybl4V3-Cx00v6koLBKjJVTryZ6iONtnY&utm_content=299031449&utm_source=hs_email","pageId":"157740697937","urlParams":{"utm_campaign":"Q1-24","utm_medium":"email","_hsmi":"299031449","_hsenc":"p2ANqtz--Gmj49wfB5L-pF9HrOLtCQ64VcOXeB4_89ZjuBbBgBLbKiuyLiErblDBWGhpiwrYUJQkpkBwZt9ip6uguybl4V3-Cx00v6koLBKjJVTryZ6iONtnY","utm_content":"299031449","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis","contentType":"landing-page","hutk":"a619f5dd2ad1e9cbf86b4737abcc1810","__hsfp":760750644,"__hssc":"182029944.1.1710935568397","__hstc":"182029944.a619f5dd2ad1e9cbf86b4737abcc1810.1710935568397.1710935568397.1710935568397.1","formTarget":"#hs_form_target_form_223984061","formInstanceId":"7632","rawInlineMessage":"<p>We've received your submission to access your Free Cyber Risk Analysis, powered by CyberStrong. An email will be sent to the email address provided with instructions on how to access the platform and get started.</p>\n<p>Want a comprehensive overview of all the value CyberStrong provides? <a href=\"/cybersecurity/cyberstrong/demo-request\" rel=\"noopener\">Book a demo</a> with our team to see the platform in action.</p>\n<p>If you have any questions or technical issues, reach out to <a href=\"mailto:info@cybersaint.io\" rel=\"noopener\">info@cybersaint.io</a>.</p>","hsFormKey":"6ea1bf96234b7d56b242246b85d44817","pageName":"Get Your Free Cyber Risk Analysis","rumScriptExecuteTime":510.1999969482422,"rumTotalRequestTime":700.9000015258789,"rumTotalRenderTime":734.5,"rumServiceResponseTime":190.70000457763672,"rumFormRenderTime":33.599998474121094,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1710935568427,"originalEmbedContext":{"portalId":"3936746","formId":"fd871f11-3a44-4919-9058-62e166ca1116","region":"na1","target":"#hs_form_target_form_223984061","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"7632","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"<p>We've received your submission to access your Free Cyber Risk Analysis, powered by CyberStrong. An email will be sent to the email address provided with instructions on how to access the platform and get started.</p>\n<p>Want a comprehensive overview of all the value CyberStrong provides? <a href=\"/cybersecurity/cyberstrong/demo-request\" rel=\"noopener\">Book a demo</a> with our team to see the platform in action.</p>\n<p>If you have any questions or technical issues, reach out to <a href=\"mailto:info@cybersaint.io\" rel=\"noopener\">info@cybersaint.io</a>.</p>","isMobileResponsive":true,"rawInlineMessage":"<p>We've received your submission to access your Free Cyber Risk Analysis, powered by CyberStrong. An email will be sent to the email address provided with instructions on how to access the platform and get started.</p>\n<p>Want a comprehensive overview of all the value CyberStrong provides? <a href=\"/cybersecurity/cyberstrong/demo-request\" rel=\"noopener\">Book a demo</a> with our team to see the platform in action.</p>\n<p>If you have any questions or technical issues, reach out to <a href=\"mailto:info@cybersaint.io\" rel=\"noopener\">info@cybersaint.io</a>.</p>","hsFormKey":"6ea1bf96234b7d56b242246b85d44817","pageName":"Get Your Free Cyber Risk Analysis","pageId":"157740697937","contentType":"landing-page","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"87b13eec-a889-4fb4-a88d-c9ed87994d0d","renderedFieldsIds":["firstname","lastname","email","company"],"captchaStatus":"LOADED","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4774","sourceName":"forms-embed","sourceVersion":"1.4774","sourceVersionMajor":"1","sourceVersionMinor":"4774","allPageIds":{"embedContextPageId":"157740697937","analyticsPageId":"157740697937","contentPageId":157740697937,"contentAnalyticsPageId":"157740697937"},"_debug_embedLogLines":[{"clientTimestamp":1710935567640,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1710935567641,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Get Your Free Cyber Risk Analysis\",\"pageUrl\":\"https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis?utm_campaign=Q1-24&utm_medium=email&_hsmi=299031449&_hsenc=p2ANqtz--Gmj49wfB5L-pF9HrOLtCQ64VcOXeB4_89ZjuBbBgBLbKiuyLiErblDBWGhpiwrYUJQkpkBwZt9ip6uguybl4V3-Cx00v6koLBKjJVTryZ6iONtnY&utm_content=299031449&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"Q1-24\",\"utm_medium\":\"email\",\"_hsmi\":\"299031449\",\"_hsenc\":\"p2ANqtz--Gmj49wfB5L-pF9HrOLtCQ64VcOXeB4_89ZjuBbBgBLbKiuyLiErblDBWGhpiwrYUJQkpkBwZt9ip6uguybl4V3-Cx00v6koLBKjJVTryZ6iONtnY\",\"utm_content\":\"299031449\",\"utm_source\":\"hs_email\"},\"pageId\":\"157740697937\",\"contentAnalyticsPageId\":\"157740697937\",\"contentPageId\":157740697937,\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1710935567642,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"CA\""},{"clientTimestamp":1710935568422,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a619f5dd2ad1e9cbf86b4737abcc1810\",\"canonicalUrl\":\"https://www.cybersaint.io/cybersecurity/cyberstrong/cyber-risk-analysis\",\"contentType\":\"landing-page\",\"pageId\":\"157740697937\"}"}]}"><iframe
name="target_iframe_fd871f11-3a44-4919-9058-62e166ca1116_7632" style="display: none;"></iframe>
</form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. AcceptDecline Free Cyber Risk Analysis: Uncover Your Cyber Risks vs. Peers in Just 3 Clicks Get Started * Platform CyberStrong Hubs * Compliance Hub * Get started with a strong compliance foundation backed by automation * Risk Hub * Advance your strategy by adopting credible cyber risk quantification & tracking * Executive Hub * Measure your results with the ultimate platform to drive executive action Use Cases * Automate Continuous Compliance * Use Continuous Control Automation to move from point-in-time assessments to real-time * Quantify & Benchmark Cyber Risk * Financialize cyber risk and compare risk likelihood, losses, and ROSI versus your peers * Risk Management as a Service (RMaaS) * For Service Providers: Enhance and expedite your cyber risk management offerings CYBERSTRONG Discover the leading cyber risk management platform, trusted by the Fortune 500 Explore the Platform FREE CYBER RISK ANALYSIS Explore your cyber risk profile and discover the power of CyberStrong Get Started * Resources Resources * Resource Center * Whitepapers, one-pagers, industry reports, analyst research, and more. * Webinar Channel * Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance professionals, and risk management experts. * Blog * Learn from our experts. * Case Studies * Explore how customers experience success with CyberStrong. FREE CYBER RISK ANALYSIS Explore your cyber risk profile and discover the power of CyberStrong Get Started * Company Company * Team * Learn more about our mission, vision, and leadership. * Careers * Join the CyberSaint team. * Partners * Join our partner ecosystem. * In the Press * CyberSaint is making headlines. * How It Works Sign In Request a Demo Sign In Request a Demo Access Your Dashboard in 3 Clicks YOUR FREE CYBER RISK ANALYSIS AWAITS Instantly see your top cyber risks based on your unique industry, company size, and revenue, and learn what controls map to those risks to inform your cyber risk management strategy. LOGIN TO ACCESS: * Your Top 5 Industry Risks: Discover the key risks specific to your peer group, helping you prioritize your cybersecurity efforts where they matter most. * Controls Related to Your Risks: Get an auto-generated list of the controls that directly address your identified risks, equipping you with the knowledge to fortify your defenses effectively. * Self-Serve Platform Experience: Explore CyberStrong's intuitive platform for yourself, showcasing the elements that can enhance your cyber risk management strategy. WHAT THOUGHT-LEADERS ARE SAYING CyberSaint’s Free Cyber Risk Analysis quickly educates the public about what risks they should be tracking, and what controls will buy down the most risk to inform their assessment strategy. - John Wheeler, Creator of the Integrated Risk Management Category while at Gartner FILL OUT THE FORM BELOW Instantly access your top industry risks and related controls in just 3 clicks, powered by patented AI and the largest cyber loss dataset in the world. First Name* Last Name* Email* Name Your Instance (ex: "My Company Name")* The CyberStrong Platform enables enterprises to assess, measure, remediate, and communicate their cyber risk posture. * Product * CyberStrong Overview * CyberStrong Compliance Hub * CyberStrong Risk Hub * CyberStrong Executive Hub * Resource Center * Resources * Blog * Glossary * Company * Contact * In the Press * Upcoming Events Connect with Us (877) 647 8273 info@cybersaint.io PR and Media Contact media@cybersaint.io Copyright © 2024 CyberSaint Security Privacy Policy