Easy as one, two, three

Subscription Plans

Compliance Focused

Priced from
$3,000 /month

  • Planned & Tracked
  • Requirements Driven
  • Audit Ready

Ideal for smaller organizations or those focused primarily on meeting specific compliance obligations, this tier offers basic cybersecurity measures focusing on compliance rather than enterprise-wide security.
Includes controls tailored to meet particular compliance needs and planning and tracking control performance.

Enterprise Security

Priced from
$5,000 /month

  • Security Risk Based
  • Enterprise Standardization
  • Coordinate Security Practices

Suitable for both small and medium/large organizations that require a more comprehensive approach to cybersecurity, this tier offers enterprise-wide standardization with well-defined and standardized controls across the entire organization.
Ensures that compliance is a natural byproduct of secure practices.

Metrics-Driven

Priced from
$9,000 /month

  • Quantitative Understanding
  • Detailed Metrics
  • Performance Forecasting

Recommended for medium to large organizations that require advanced cybersecurity measures, this tier offers metrics-driven practices that provide management insight and enable governance oversight.
Includes detailed metrics for performance prediction, continued operations, and areas for improvement
FEATURES

Subscription Benefits

Predictable Costs

Know how much you'll be billed each month, making budgeting and expense management a breeze.

Focus on Results

Concentrate on achieving desired outcomes rather than counting hours worked, promoting a results-driven approach to your projects.

Simplified Billing

Enjoy the convenience of a single, recurring charge instead of multiple invoices for individual services or hours worked.

Consistent Service

With a monthly subscription, clients have access to ongoing support and services, which can lead to more consistent and reliable results over time.

Frequently asked Questions

What services are included in each subscription tier?

Compliance Focused: This tier is suitable for clients who need to meet specific compliance obligations and have some documentation and tracking of their security and privacy controls. The services we provide in this tier include:
    • Conducting a gap analysis to identify the compliance requirements and the current state of the controls
    • Developing and documenting policies and procedures for the required controls
    • Assigning and training roles and responsibilities for implementing and maintaining the controls
    • Defining and reporting metrics for monitoring and measuring the effectiveness of the controls
    • Providing guidance and support on complying with relevant laws, regulations, standards, and best practices


Enterprise Security:
This tier suits clients who want to standardize and optimize their security and privacy controls across the enterprise and integrate them into their business processes, systems, and projects. The services we provide in this tier include:
    • Conducting a maturity assessment to evaluate the current level of standardization and optimization of the controls
    • Developing and implementing a roadmap for achieving enterprise-wide standardization and optimization of the controls
    • Integrating and aligning the controls with the strategic objectives and risk appetite of the organization
    • Implementing and improving continuous processes for auditing, reviewing, assessing, and testing the controls
    • Providing support and advice on managing and remediating security and privacy incidents and breaches

Metrics-Driven: This tier suits clients who want to achieve excellence and innovation in their security and privacy controls and demonstrate their value proposition and competitive advantage in the market. The services we provide in this tier include:
    • Conducting a benchmarking analysis to compare the performance of the controls with industry peers and best practices
    • Developing and implementing a plan for adopting emerging technologies, methodologies, and frameworks for security and privacy
    • Demonstrating the value proposition and competitive advantage of the security and privacy controls to stakeholders and customers
    • Providing thought leadership and advocacy on security and privacy issues and trends
    • Influencing the development of standards and regulations for security and privacy

Can a custom tier be developed with services from different levels?

Yes, we can create a custom tier for you that incorporates services from different levels. We understand that each client's needs are unique, and our goal is to provide tailored solutions that best fit your requirements. Our team will work closely with you to understand your needs and combine elements from various levels to design a custom package that aligns with your objectives and budget. Please feel free to contact us to discuss your needs, and we'll be more than happy to develop a custom tier just for you.

Note: Our pre-packaged tiers are inspired by Secure Controls Framework’s™ (SCF) Security & Privacy Capability Maturity Model (SP-CMM). 

SCF SP-CMM: 
https://securecontrolsframework.com/capability-maturity-model

License Link:
https://creativecommons.org/licenses/by-nd/4.0/legalcode

I don't need a subscription. Do you offer project work options?

Yes, we absolutely offer project work options for clients who do not require a subscription. We understand that each client's needs are unique, and we strive to provide flexible solutions that cater to your specific requirements. Contact us for a free consultation and needs assessment.

What are some project examples performed outside subscriptions?

Here are some project examples that can be performed outside of subscriptions, and feel free to contact us with your particular need to determine if we can meet it:

Table Top Exercises: Conducting simulated cybersecurity incidents or crisis scenarios to evaluate your organization's response capabilities and identify areas for improvement.

Maturity Assessments: Assessing the maturity of your organization's cybersecurity practices, processes, and controls to identify gaps, prioritize risk mitigation efforts, and ensure compliance with industry standards and regulations.

Insider Threat Program Development: Designing and implementing a comprehensive insider threat program to detect, prevent, and mitigate risks posed by employees, contractors, or other individuals with access to your organization's sensitive information and systems.

Ransomware Preparedness and Response: Helping your organization to develop and implement a proactive strategy to prevent and respond to ransomware attacks, including employee training, incident response planning, and data backup and recovery solutions.

Vulnerability Assessments and Penetration Testing: Identifying potential weaknesses in your organization's systems, networks, and applications through vulnerability assessments and penetration testing to reduce the risk of unauthorized access and data breaches.

Phishing Simulation and Awareness Training:
 Specifically designed to help your organization assess and improve your employees' ability to recognize and respond to phishing attacks. This standalone service aims to minimize the risk of security breaches resulting from phishing and other social engineering tactics.

Incident Response Planning: Developing and implementing a robust incident response plan to ensure your organization can quickly and effectively respond to security incidents and minimize potential damage and downtime.

Compliance Audits and Gap Analysis: Evaluating your organization's compliance with relevant industry regulations, standards, and best practices, such as GDPR, HIPAA, PCI DSS, or NIST frameworks, and providing recommendations to address identified gaps and risks.

Data Privacy Program Development: Creating and implementing a comprehensive data privacy program that aligns with applicable privacy regulations and helps protect your organization's sensitive information while ensuring compliance.

Third-Party Risk Assessments: Evaluating the cybersecurity posture of your vendors, partners, or other third parties to manage potential risks and ensure that they meet your organization's security and compliance requirements.

What should I consider when hiring a vCISO?

    Clearly Define Scope and Expectations
    Before entering negotiations with potential vCISO candidates, ensure you clearly understand what you need from the virtual Chief Information Security Officer. Outline the specific responsibilities, tasks, deliverables, and information security program expectations. The clarity in scope can help prevent misunderstandings and ensure you're paying only for the services you need from highly trained professionals.

    Research and Benchmarking
    Understanding the market rate for vCISO services and information security leadership within organizations will give you an edge in negotiations. Research competitors' pricing, speak to peers in various companies who have hired full-time or virtual CISO services and use this information to negotiate from an informed standpoint.

    Emphasize Long-Term Relationships
    If you're considering a long-term engagement with the security professional, emphasize this in negotiations. Service providers may be more willing to offer favorable pricing if they see the potential for a continued business relationship.

    Consider Bundling Services
    Sometimes, vCISO service providers may offer related third-party services that can be bundled together at a discount. If the provider provides complementary services like general IT consulting, cyber strategy, security awareness or compliance training, bundling might offer a cost-effective solution.

    Leverage Multiple Quotes
    Having quotes from multiple providers creates a competitive scenario that can be leveraged to get the best pricing for the security program. But be careful to compare the quality of service, not just the price, to make the right decision for your organization.

    Negotiate Payment Terms
    Flexibility in payment terms, such as monthly or quarterly payments, can sometimes be negotiated to align with your budgeting process. Some providers may offer a discount for upfront payment for an extended period.
    Contractual Considerations

    Clear Definition of Deliverables
    Ensure the contract clearly defines what is to be delivered, the timeline, the experience required, and the expected quality standards, including information security program details.

    Termination Clauses
    Understand the terms under which either party can terminate the contract. Include provisions that protect your interests if the services are not up to par.

    Intellectual Property Rights
    Make any intellectual property rights clear, especially if the vCISO will create custom solutions or methodologies for your organization's security program.

    Confidentiality and Non-Compete Clauses
    These can protect sensitive information and prevent the virtual security officer from engaging with direct competitors during and possibly after the engagement.

    Liability and Insurance
    Detail the liability of each party and any required insurance, especially concerning cybersecurity incidents, which may involve third-party entities.

     Integration with Existing Teams
    Consider how the vCISO will integrate with existing teams and what support or resources they need. These aspects should be part of the agreement to avoid confusion later. Provide necessary details about the in-house teams they will work with.

    Regular Reporting and Communication
    Set clear guidelines for regular reporting and communication between the vCISO and key stakeholders, ensuring alignment with your organization's security program and leadership strategy.

    Conclusion
    Hiring a vCISO is not just about selecting a candidate and agreeing on a price. The negotiation process can be intricate, requiring a clear understanding of needs, careful research, and strategic negotiations with professional service providers. Considering the above tactics and elements, you can create a comprehensive agreement that aligns with your organization's goals, cybersecurity program, and budget.
    In a world where cybersecurity and cyber strategy are paramount, having a vCISO can be a valuable asset. The process of hiring one should be approached with the same care and strategic consideration that you would apply to any other critical business decision. From defining clear expectations to understanding legal implications and integrating with in-house teams, every step is crucial in ensuring a fruitful collaboration. By employing sound negotiation tactics and being aware of all elements involved, you can optimize the value you receive from your vCISO investment.
Created with