Skip to main content

Getting Started with Hyver

Follow these steps to set up Hyver and start managing your organization’s cyber risk.

Updated over 5 months ago

Overview

This article walks you through the setup process for using Hyver. It covers the core steps you need to complete before you can start assessing cyber risk, discovering assets, or creating mitigation plans. These actions lay the groundwork for effective exposure management.

Before you begin, check out Before You Start for helpful context and system requirements.


1. Set up user access and authentication

  • Log in with the credentials provided by CYE.

  • Set up SSO if possible — this is strongly recommended.

  • Two-factor authentication (2FA) is enforced by default.

  • To invite others, go to Settings > Members and Groups.


2. Configure your company profile

Add your company’s basic information such as name, sector, and other identifiers.
Go to Settings > Company Profile to get started.

See also: [Company Profile]


3. Define threat sources

Identify the types of attackers relevant to your organization — such as external actors or insiders. These will appear automatically in every engagement’s Mitigation Graph.

Go to Settings > Threat Sources.


4. Add your business assets

List and describe the business assets you want to protect — like customer data, employee records, or intellectual property. You can also assign cost and importance levels to each asset.

Go to Settings > Business Assets.

See also: [Business Assets]


5. Input Cost of Breach data

Complete the Cost of Breach (CoB) questionnaire. This allows Hyver to calculate the potential financial impact of a breach.

Click Cost of Breach from the left navigation menu.


6. Complete your cybersecurity maturity assessment

Use the NIST Cybersecurity Framework (CSF) 2.0 as your guide. You'll rate your organization's performance across cybersecurity categories, which Hyver maps to relevant findings, processes, and technologies.


7. Define and activate your first engagements

7a. Create an Asset Discovery engagement

  • Typically activated by your CYE account manager.

  • Scans for external-facing assets and catalogs them.

See also: [Activate Asset Discovery Engagement]
Learn more: [Managing Assets]

7b. Activate an Internet Perimeter engagement

  • Usually handled by CYE.

  • Identifies vulnerabilities exposed to the internet and recommends mitigation.

7c. (Optional) Define Cloud Engagements

  • Set up integrations for automatic cloud assessments.


8. Configure platform settings

Only Admin users can change these. Go to Settings to customize:

  • Notification preferences

  • Integration settings

  • Findings prioritization

  • Company profile


9. (Optional) Set up integrations

Connect Hyver with systems like Jira and ServiceNow for ticketing and task management.

See also: [Hyver Integrations]


10. Start using Hyver

Once your data is in, you can:

  • Review and edit findings — Go to Findings

  • Explore the Mitigation Graph — Go to Mitigation Graph

  • Build mitigation plans — Go to Mitigation Plans

  • Monitor progress — Visit the Risk Dashboard

See also:


Important notes

  • Some engagements (e.g. Asset Discovery) can only be activated by CYE.

  • Business assets and threat sources must be defined for full platform functionality.

  • CoB calculations and maturity scoring rely on accurate input during onboarding.


Wrap-up / Next Steps

You don’t have to do everything at once — go at the pace that works for your team. Start with the core setup steps, then expand into deeper risk analysis and planning as you get more comfortable with the platform.

Did this answer your question?