← Back to Tools

Tool Documentation & Data Sources

Comprehensive documentation for every CyberPoint Advisory tool, including methodology, data sources, and citations.

Table of Contents

1. Compliance ROI Calculator

Plan cyberpointadvisory.com

Purpose

Helps business owners and CFOs build a data-driven financial case for cybersecurity compliance investment. Calculates ROI, payback period, and 5-year NPV using industry benchmarks.

Target User

CFO, business owner, or compliance officer evaluating whether to invest in a compliance program. Designed for Texas SMBs (under 250 employees).

How It Works

Users select an industry preset or enter custom values. The calculator computes three benefit categories and shows real-time results with animated counters.

Methodology

Breach Risk Value = Average Breach Cost x Annual Probability x Risk Reduction % Additional Revenue = Avg Deal Size x Annual Deals x Conversion Improvement % Insurance Savings = Annual Premium x 15% (average reduction with compliance) ───────────────────────────────────────────────────────────────── Total Annual Benefit = Breach Risk Value + Additional Revenue + Insurance Savings ROI = ((Total Annual Benefit - Annual Compliance Cost) / Annual Compliance Cost) x 100 Payback Period = Annual Compliance Cost / (Total Annual Benefit / 12) months 5-Year NPV = Sum of (Annual Net Benefit / (1 + 0.08)^year) for years 1-5

Data Sources

Data PointValueSourceYear
Global average breach cost$4.88MIBM Security — Cost of a Data Breach Report2025
U.S. average breach cost$9.36MIBM Security — Cost of a Data Breach Report2025
Healthcare breach cost$10.93MIBM Security — Cost of a Data Breach Report (industry breakdown)2025
Financial services breach cost$6.08MIBM Security — Cost of a Data Breach Report2025
Manufacturing breach cost$5.56MIBM Security — Cost of a Data Breach Report2025
Technology breach cost$5.45MIBM Security — Cost of a Data Breach Report2025
Retail breach cost$3.91MIBM Security — Cost of a Data Breach Report2025
Annual breach probability~14.7%IBM/Ponemon Institute — 27.7% over 2 years, annualized2025
Breach risk reduction60-80%Forrester Research — Total Economic Impact of Compliance Automation2025
Sales conversion improvement10-25%Forrester Research — Enterprise buyer survey2024
Insurance premium reduction15-25%Marsh McLennan — U.S. Cyber Insurance Market Report2024
Enterprise compliance requirement89%Gartner — Market Guide for IT GRC Platforms2025
NPV discount rate8%Standard SMB weighted average cost of capital (WACC)N/A

2. Compliance Readiness Calculator

Assess cyberpointadvisory.com

Purpose

Evaluates organizational readiness for SOC 2, ISO 27001, or HIPAA compliance through 20 framework-specific yes/no/partial questions, each citing the official standard clause.

How It Works

User selects a framework, answers 20 questions (Yes=2pts, Partial=1pt, No=0pts), and receives a percentage score with tier-based recommendations (5 tiers from <40% to 90%+).

Data Sources

FrameworkStandard ReferencedVersion
SOC 2AICPA Trust Services Criteria (TSC) — CC1-CC9, A1, C1, PI12017 (current)
ISO 27001ISO/IEC 27001:2022 — Annex A controls2022
HIPAAHIPAA Security Rule — 45 CFR Part 1642013 (current)

Each question cites its specific control clause (e.g., "SOC 2 CC6.1" or "ISO 27001 A.8.1").

3. SB 2610 Readiness Assessment

Assess cyberpointadvisory.com

Purpose

4-step wizard evaluating a Texas business's readiness for SB 2610 safe harbor protection. Determines tier, assesses framework compliance, and generates prioritized recommendations.

How It Works

Step 1: Business profile (employee count determines Tier 1/2/3). Step 2: Framework-specific compliance questions (dynamic based on tier). Step 3: Documentation assessment. Step 4: Breach response readiness. Produces a scored report with prioritized gaps.

Data Sources

Data PointSource
SB 2610 tier structure and requirementsTexas Business & Commerce Code Chapter 542 (SB 2610, 88th Legislature)
Tier 1 requirements (password policies, training)SB 2610 Section 542.002(a)
Tier 2 requirements (CIS Controls v8 IG1)SB 2610 Section 542.002(b); CIS Controls v8.0
Tier 3 requirements (recognized frameworks)SB 2610 Section 542.002(c); NIST CSF, ISO 27001, SOC 2, etc.
Effective date: September 1, 2025SB 2610 Section 542.005

4. SB 2610 Cost Estimator

Plan cyberpointadvisory.com

Purpose

Provides transparent cost estimates for SB 2610 compliance implementation across 6 categories, with DIY, guided, and full-service pricing comparisons.

How It Works

User selects their tier, industry, and data types. The tool calculates costs across: assessment, policy development, technical controls, training, testing, and ongoing maintenance.

Data Sources

Data PointSource
SB 2610 tier requirementsTexas Business & Commerce Code Chapter 542
CIS Controls v8 IG1 (56 safeguards)Center for Internet Security — CIS Controls v8.0
Cost ranges by tierCyberPoint Advisory — proprietary market analysis of Texas MSP/MSSP pricing
Industry-specific compliance requirementsHIPAA Security Rule, PCI DSS v4.0, NIST CSF 2.0

Note: Cost estimates are based on CyberPoint Advisory's experience with Texas SMBs and current market rates. Actual costs vary by organization.

5. Framework Selector

Plan cyberpointadvisory.com

Purpose

8-question wizard that recommends the best cybersecurity framework based on business size, industry, compliance needs, budget, and risk profile.

Frameworks Evaluated

FrameworkPublisherVersionBest For
NIST Cybersecurity FrameworkNISTCSF 2.0 (Feb 2024)General-purpose, Tier 3 compliance
CIS ControlsCenter for Internet Securityv8.0 (May 2021)Tier 2 compliance, smaller orgs
ISO/IEC 27001ISO/IEC2022 editionInternational business, certification
NIST SP 800-171NISTRev 3 (May 2024)Government contractors, CUI
Essential EightAustralian Signals Directorate2023 updatePragmatic baseline

6. Timeline Planner

Plan cyberpointadvisory.com

Purpose

Generates a phased implementation timeline with Gantt chart view based on tier, maturity, resources, urgency, and budget. Supports ICS calendar export.

Data Sources

Data PointSource
SB 2610 effective date (Sept 1, 2025)Texas Business & Commerce Code Chapter 542
CIS Controls implementation timelinesCIS — CIS Controls Implementation Guide
Phase duration estimatesCyberPoint Advisory — proprietary implementation data

7. SB 2610 Implementation Guide

Implement cyberpointadvisory.com

Purpose

Tier-specific compliance checklist with CIS Controls v8 IG1 safeguards and linked CISA educational resources. Tracks implementation progress locally.

Data Sources

Data PointSource
CIS Controls v8 IG1 safeguards (56 controls)Center for Internet Security — CIS Controls v8.0
"How-To" implementation guidesCISA — Cybersecurity Resources for Small Business
SB 2610 tier-specific requirementsTexas Business & Commerce Code Chapter 542

8. Safe Harbor Checklist

Implement cyberpointadvisory.com

Purpose

Interactive progress-tracking checklist for SB 2610 safe harbor compliance. Tier-specific items with legal citations and completion percentages.

Data Sources

Data PointSource
Safe harbor requirements by tierTexas Business & Commerce Code Chapter 542
Recognized cybersecurity frameworks listSB 2610 Section 542.002(c) — NIST CSF, ISO 27001, CIS Controls, SOC 2, HITRUST, SCF, PCI DSS, HIPAA, GLBA, FISMA
Documentation requirementsSB 2610 Section 542.003 — burden of proof provisions

9. NIST CSF 2.0 Maturity Assessment

Assess cyberpointadvisory.com

Purpose

Self-assessment across all 6 NIST CSF 2.0 functions (Govern, Identify, Protect, Detect, Respond, Recover) with Tier 1-4 scoring and prioritized recommendations.

Data Sources

Data PointSource
6 CSF functions and definitionsNIST — Cybersecurity Framework 2.0 (February 2024)
Implementation Tier definitions (1-4)NIST CSF 2.0 — Section 4.2 Framework Tiers
Improvement recommendations per functionNIST CSF 2.0 — Implementation Examples (NIST SP 1299)

10. NIST CSF 2.0 Interactive Function Guide

Implement cyberpointadvisory.com

Purpose

Interactive reference for all 6 NIST CSF 2.0 functions, 23 categories, and 106 subcategories with implementation examples and CIS Controls mappings.

Data Sources

Data PointSource
106 subcategories and outcomesNIST — Cybersecurity Framework 2.0 Core (February 2024)
Implementation examplesNIST SP 1299 — CSF 2.0 Implementation Examples
CIS Controls mappingsCIS — CIS Controls v8 Mapping to NIST CSF 2.0

11. NIST CSF Roadmap Generator

Implement cyberpointadvisory.com

Purpose

Generates customized phased implementation plans based on organization size, current maturity tier, target tier, timeline, budget, and industry.

Data Sources

Data PointSource
NIST CSF tiers and functionsNIST — Cybersecurity Framework 2.0
Phase structure and task estimatesCyberPoint Advisory — proprietary implementation methodology
NIST CSF subcategory IDs in task listsNIST CSF 2.0 Core

12. CIS Controls IG Selector

Assess cyberpointadvisory.com

Purpose

7-question weighted quiz to determine the appropriate CIS Controls Implementation Group (IG1, IG2, or IG3) based on organization size, data sensitivity, and risk profile.

Data Sources

Data PointSource
IG1: 56 safeguards (essential hygiene)Center for Internet Security — CIS Controls v8.0
IG2: 130 safeguards (expanded)CIS Controls v8.0 — Implementation Group 2
IG3: 153 safeguards (comprehensive)CIS Controls v8.0 — Implementation Group 3
IG selection criteriaCIS — CIS Controls v8 Implementation Guide for SMEs

13. Breach Response Plan Generator

Document cyberpointadvisory.com

Purpose

Interactive fillable form that generates a NIST-based breach response plan with SB 2610 compliance documentation, emergency contacts, backup procedures, and customer data inventory.

Data Sources

Data PointSource
4-phase incident response (Prepare, Detect, Contain, Recover)NIST SP 800-61 Rev 2 — Computer Security Incident Handling Guide
Texas breach notification requirementsTexas Business & Commerce Code Chapter 521 — Unauthorized Use of Identifying Information
SB 2610 documentation requirementsTexas Business & Commerce Code Chapter 542
FBI IC3 reportingic3.gov — Internet Crime Complaint Center
CISA incident reportingcisa.gov/report

14. Cybersecurity Quick Reference Guide

Document cyberpointadvisory.com

Purpose

CISA-based cybersecurity self-assessment with 24-item checklist, maturity scoring, common vulnerability fixes, and incident response template for small businesses.

Data Sources

Data PointSource
24-item assessment categoriesCISA — Cyber Essentials for Small Business
Maturity level definitionsNIST CSF 2.0 Implementation Tiers
Vulnerability remediation guidesCISA — Known Exploited Vulnerabilities Catalog; NIST NVD
Incident response templateNIST SP 800-61 Rev 2

Master Source List

All data sources referenced across the CyberPoint tool suite, organized by publisher.

Government & Standards Bodies

Industry Organizations

Research & Reports

Legal