Why Our Services
1. Expertise at a Fraction of the Cost:
By leveraging our vCISO services, you can access high-level cybersecurity expertise without the financial commitment of hiring a full-time Chief Information Security Officer (CISO) or their team. The cost of an in-house CISO and security team, with an average annual salary working in the U.S., the average total compensation—defined as base salary plus annual target bonus and the annual equity value—is
$550,000 with a median of $388,000 (IANS 2023).
​
2. Tailored Solutions for Your Business:
We can provide customized security solutions tailored to your unique needs and risks. We bring a wealth of experience to help develop, implement, and manage security programs specific to your industry and objectives.
​
3. Immediate Availability:
Our services offer the benefit of immediate availability. While recruiting an in-house CISO can take months, if not longer, we can be onboarded quickly to address pressing security concerns.
​
4. Multi-Faceted Skill Set:
We have extensive knowledge in various areas of cybersecurity, risk management, compliance, and technology. We will bridge any gap between technical teams and management, ensuring that security aligns with overall business goals.
​
5. Scalable Services:
You can scale our services up or down according to your evolving security requirements. This flexibility is particularly valuable for startups and small to mid-sized businesses experiencing growth.
​
6. Industry Knowledge:
We have experience working in diverse industries. This knowledge can bring fresh perspectives and best practices to address emerging threats and challenges in your specific sector.
​
7. Cost-Efficient Security Management:
By outsourcing the vCISO role, you can save on various costs associated with full-time employees, including salaries, benefits, training, and overhead.
​
8. Risk Mitigation:
The cost of a data breach can be astronomical. Engaging us helps mitigate the risk of data breaches, regulatory fines, and reputational damage. This protection is especially valuable in industries where data privacy and regulatory compliance are paramount.
​
9. Vendor-Neutral Advice:
We bring an unbiased perspective when evaluating and recommending cybersecurity solutions. We offer vendor-neutral advice and guide you in choosing the best technologies for your unique needs.
10. Compliance Assurance:
For businesses dealing with complex regulatory requirements (HIPAA, GDPR,FERPA, PCI etc.), we can help maintain compliance and navigate evolving regulations. We ensure that security measures are up-to-date and aligned with legal standards.
11. Focus on Business Growth:
By outsourcing cybersecurity leadership to a vCISO service such as us, business leaders can concentrate on strategic growth initiatives rather than becoming overwhelmed with the day-to-day security management.
​
12. Cybersecurity Strategy:
We work with you to develop a comprehensive cybersecurity strategy that not only protects against threats but also aligns with broader business goals.
We think these are pretty compelling reasons that highlight the benefits of vCISO services, including cost-efficiency, specialized expertise, scalability, and the ability to stay ahead of emerging threats and regulatory changes. Coupled with the substantial cost savings when compared to hiring full-time in-house security professionals, often difficult to find with experience, our services offer an attractive and practical solution for businesses seeking robust cybersecurity leadership. Third-party risk and fourth-party risk are becoming increasingly
important, particularly if investors expect a company will be acquired. At some point before the due diligence process, the security program
needs to be evaluated and matured so security does not become the critical path to a transaction. Our goal thus is to make the internet a better place to live, work and raise a family in.

1
vCISO with Blue Team
​Services offered as part of our Guardian tier.
Cancel anytime
​​
Strategic Services
​
-
Customer and partner questionnaire support (Vendor Risk Assessments)
-
Annual information security training
-
Annual business continuity table-top exercise
-
Annual qualitative information security risk assessment
-
Annual SOC2 or similar audit support
-
Compliance with regulations and standards such as NIST-CSF, FedRamp, FISMA, PCI, or HITRUST
-
Annual IT security assessment
-
Chairing a quarterly governance committee
-
Third-party critical vendor/supply chain reviews
-
Managed KnowBe4 Training Services (license fee extra)
-
GRC services
-
Information security program creation and management (Policy and audit ready documentation).
​
Tactical Services
​​
-
Technical Vulnerability Management Services
-
Endpoint Detection and Response - Threatlocker
-
Managed KnowBe4 Training Services (license fee extra)
-
Network Vulnerability Assessments - External and basic web application scans
-
Penetration Testing
-
SAST/DAST Code Security - S-SDLC
-
Network Vulnerability Assessments - Internal
-
Security Training Program - Employees (Managed KnowBe4 Training Services)
2
Managed Security Provider
Managed Security Operations
Security Architecture & Design: Tailored frameworks built on proven controls, aligned with industry standards (ISO 27001, NIST, GDPR).
Vulnerability Management: Ongoing scanning, patch prioritization, and remediation tracking to keep attack surfaces minimized.
Compliance Assurance: Regular audits, reporting, and guidance to keep you audit‑ready for PCI‑DSS, HIPAA, SOC 2, and more.
Value‑Added Reseller (VAR) of Fully Vetted Tools
Hands‑On Validation: Every product we offer has been deployed, configured, and defended in our own practice. We only resell tools that have passed our rigorous, real‑world testing.
Integrated Solutions: Seamless integration of security technologies—firewalls, endpoint protection, SIEM, CASB, and more—into a unified defense stack.
Expert Implementation & Tuning: From initial rollout to ongoing optimization, our engineers ensure each solution operates at peak efficacy for your specific environment.
Lifecycle Support: Licensing management, upgrades, and continuous health checks keep your tools current and effective without extra overhead.
Why Our Approach Matters
Zero‑Compromise Quality: If we haven’t personally vetted a product, it never reaches our catalog. This guarantees you only receive technology we trust enough to protect our own assets.
Practice‑First Insight: Our security team lives the same challenges you face daily, translating hands‑on experience into actionable, reliable services.
Transparent Partnership: Clear SLAs, detailed reporting, and open communication mean you always know how your security posture is evolving.
Bottom line: With Old Pueblo Security Group you gain a managed security partner that not only monitors and defends your environment but also supplies only the most reliable, battle‑tested security tools, because we sell confidence, not just software. Let us safeguard your business while you focus on growth.
3
Personal CyberSecurity for individuals - Tradecraft
This course is designed to address the fundamental concerns of journalists, concerned citizens, activists, whistle blowers, missionaries, corporate executives and liberty lovers in general, with regard to digital security. Whether hackers, governments, criminals or acts of espionage; our privacy is in serious jeopardy.
You will learn to secure your devices and communications in the following ways:
Properly employ symmetric and asymmetric encryption
Create and safely store powerful passwords
Guard against common criminal and state level intrusion techniques
Recognize unsafe software you are using now and explore safe replacements
Surf the web anonymously
Explore the deep web
Transfer files safely
Communicate securely and privately
Understand and deal with malicious firmware
Crypto-currencies
Properly employ "burner" phones
​
This course is meant to take the uncertainty and guesswork out of digital security, give you a fundamental base of knowledge to grow from and get you up and running with the highest levels of security available TODAY.
4
Compliance As A Service (CaaS)
It’s common for companies in regulated sectors to hit compliance roadblocks right from the start. They aren’t even aware of the specific compliance requirements that apply to them. Next comes the challenge of overcoming compliance gaps – a must if you want to avoid failing your next audit and losing your operational licenses.
​
But even with all the right knowledge and tactics in place, you’re still not in the clear. Without appropriate documentation to prove that you’re meeting regulatory requirements, your organization remains at serious risk during audits and reviews.
​
It’s a lot to get your head around. That’s why we’re focused on providing education-led, proactive compliance support to every one of our clients.
We're here to help with:
-
Gap analysis & audit roadmap
-
Build policies, procedures, and controls
-
Assess overlap with other audits
-
Advocate client on any ‘audit pushback’
-
Oversee audit readiness
-
Acting as the liaison with auditors
-
Build future audit roadmap
-
Tactical Implementation Verification; We ensure the technical controls match your documented policies through regular testing and validation.
-
Provide evidence in proper 'audit language
-
HIPAA
-
HITRUST
-
NIST CSF
-
ISO
-
PCI-DSS
-
SOX
-
CMMC
-
FedRamp
-
FISMA
​
Or you just need to prove to your insurance carrier you are doing the right things to mitigate cyber risk and are insurable.
Many regulated businesses mistakenly view compliance as merely deploying robust cyber defenses. However, true compliance demands strategic oversight beyond just tools.
Cybersecurity and IT represent the tactical execution, while compliance forms the overarching strategy.
​
Our compliance support for regulated businesses integrates both, ensuring your stated policies align seamlessly with your actions—and that you can demonstrate this alignment to auditors. Let us manage this function for you.
​
5
Customer Security Assessment Questionnaires
Security Assessment Questionnaires (SAQ’s) are resource-intensive, time-sensitive, and absolutely critical to growth.
Securing these contracts/partnerships directly impact scalability and market share obtainment, but poor security controls and inadequate processes can compromise these opportunities.
​
-
Complete the SAQ and write answers to be reused in subsequent SAQ’s
​
-
Ensure policies, procedures, and controls are created or refined to expedite future assessments by providing a Security Program Overview document.
​
-
Quickly remediate risk areas to score higher on the questionnaire
​
-
Affirm the questionnaire is completed in proper security jargon
​
-
Act as security liaison with prospective client/partner, advocating on the company’s behalf
​
-
Act as your CISO (which is oftentimes a requirement for the client/partner)

Get in Touch
How can we serve?
