You can reap the benefits of our Guardian CISO and Blue Team advisory services at $10,000 a month. This vCiso as a service pricing plan is a great choice for companies already working to maintain and improve their security, start-up with no security staff and compliance programs or looking to augment/manage their current teams.
With the Guardian model, our Cybersecurity team becomes an extension of your organization's capabilities, providing highly involved services with our partners in security infrastructure with all prior features as well as:
​​
Security Roadmap
We won't just point out your problems and hit the road. We'll help you improve by creating a personalized strategy for executing your security projects in a way that manages your risks and aligns with your big-picture goals. Our team will build a comprehensive Cybersecurity road map that happily marries your security processes with your business goals. We'll also monitor your road map progress down the line to make sure all is well.
-
Meet with executive management
​
-
Understand your IT environment and security program to provide expert insight into industry leading practices
​
-
Conduct initial security assessment and high-level gap assessment to understand deficiencies and improvement areas
​
-
Establish a proposed program roadmap for security projects based on identified deficiencies
​
-
Maintain a deep understanding of your business model and objectives and provide insight as it relates to risk.
​
Security Assessment Questionnaire
We'll help you respond to your customers' security assessment questionnaires (SAQs) to prove your security and compliance readiness and support you in responding to queries.
​
-
Complete 1 Security Assessment Questionnaire.
-
Complete the SAQ and write answers to be reused in subsequent SAQ’s
-
Ensure policies, procedures, and controls are created or refined to expedite future assessments
-
Quickly remediate risk areas to score higher on the questionnaire
-
Affirm the questionnaire is completed in proper security "language".
-
Act as security liaison with prospective client/partner, advocating on the company’s behalf
-
Act as your CISO (which is oftentimes a requirement for the client/partner)
​
Resource Guidance
You'll learn about all the latest Cybersecurity resources, tools and technologies — and which ones will best complement your IT toolbox.
-
Provide resources around compliance efforts.
​
People, Process Technology
Our team will connect you with the hottest security policy templates around so you can lay out your company's guidelines for handling sensitive data.
​
-
Policy Templates
-
Customize controls and policies
-
Standard Operating Procedures
-
Technical SOPs
​
Facilitate Penetration Testing
​
-
Network Vulnerability Assessments External and basic web application scans
​
Report Cards
You'll feel like an A+ student when we provide you with weekly report cards on any progress or issues we encounter in your Cybersecurity posture.
​
Provide Weekly Report Card on Progress, Issues,
​
Security Management
Our team will prepare you to hold recurring meetings to discuss and implement security management.
-
Conduct recurring security team meetings with management
-
Weekly configuration monitoring
-
Digital footprint and risk monitoring
-
Monthly technical assessment of your cloud security posture, architecture, permissions and entitlements
-
Dedicated resource to support your sales cycle for all security/compliance inquiries and requests from prospects
​
Governance, Risk and Compliance (GRC)
We'll assist you in choosing, obtaining and implementing a dependable GRC solution.
​
-
We'll create and give you solid recommendations on the best risk mitigation tools for your company and even go the extra mile to implement them for you.
-
Vulnerability management program. (Scan, assess, triage, scan for remediation success).
​
Evidence Control
Preparing for an upcoming audit or ongoing compliance is easy as pie when we help you review and improve your audit evidence.
​
Security Content
We'll take a look at your existing security awareness content, make changes and create brand-new content for your team.
Risk Mitigation Tools
Get ready for tool time. We'll provide you with recommendations on how to enhance your Cybersecurity with tool integrations you can use to complement your existing architecture and data flows.
​
Security Program
Lead and direct security program enhancements and/or compliance initiatives including: defining scope and objectives, providing recommendations on configuration, and assigning tasks to delegates for implementation
​
Security Management
Our team will prepare you to hold recurring meetings to discuss and implement security management.
-
Conduct recurring security team meetings with management
-
Weekly configuration monitoring
-
Digital footprint and risk monitoring
-
Monthly technical assessment of your cloud security posture, architecture, permissions and entitlements
-
Dedicated resource to support your sales cycle for all security/compliance inquiries and requests from prospect
​
Compliance as a Service
Oversee annual compliance audits:
-
Coordinate compliance efforts
-
Represent your company with audit team
-
Facilitate evidence validation before and during audit fieldwork
-
Gap analysis & audit roadmap
-
Build policies, procedures, and controls
-
Assess overlap with other audits
-
Advocate client on any ‘audit pushback’
-
Oversee audit readiness
-
Acting as the liaison with auditors
-
Build future audit roadmap
-
Provide evidence in proper 'audit language'
​
​Operations and Management
We can coordinate disaster recovery tests, incident response and business continuity operations annually.
​
-
Data Privacy Officer service
-
Transfer Impact Assessments/Business Impact Analysis services
-
Design and implementation of a public security page
-
Annual business continuity table-top exercise
-
External monthly vulnerability assessments (up to 10 targets)
-
Internal monthly vulnerability assessments (up to 4,000 targets)
​
Security Awareness and Training Program
​
-
Security Training Program - Employees (Managed KnowBe4 Training Services)
-
Custom Industry Based Training Development
-
Role Based Training
-
Annual information security training
​
​