Fee

NoTitle/Services/ProductDescriptionsPriceBuy Now
IT, CYBERSECURITY AND COMPLAINCE
ES00Initial IT and Cybersecurity Consulting and Advisory (1 Hours)$200-$300 HourlyIntake
ES01
ES02PROFESSIONAL SERVCIES
ES03Cybersecurity Compliance and Litigation Support
ES04Data Brach Investigation and Litigation Support
ES05Data Privacy Investigation and Litigation Support
ES06M & A Enterprise Vendors or Partner Investigation Support
ES07eDiscovery Investigation, and Litigation Support
ES08Cyber Crimes Investigation
ES09Subject Matter Experts in Cybercrime Litigation and Support
ES10
ES11SELECT YOUR SCOPE OF WORK (SOW) AND KEY OBJECTIVES
ES12Meeting Key Senior Management- Enterprise Mission Objectives
ES13Meeting Key Business Management- Business Practices
ES14Meeting Key Technology Management- Current Technologies
ES15Meeting Key Security Management- Current Security Controls
ES16Gathering Key Technical Data (Diagram, Data Flow, Policies, Procedures)
ES17Reviewing & Analyzing the Information Across Cyber and Security Best Practices & Frameworks
ES18Reporting Current State and Propose State – Maturity Model & Identify Key Risks
ES19Recommendation of New or Revised Security Controls
ES20Recommendation of New IT & Security Solutions
ES21Any other client-defined objectives, which are not listed in this engagement
ES22High-Level Enterprise Risk Assessment (up to 3 sites)
ES23Enterprise Policy Review & Development
ES24IT Policy to IT Control (GRC) Compliance Framework Development
ES25Security Awareness Program Development
ES26Vendor Security Program Development
ES27Vendor Cloud Security Risk Assessment ( up to five vendors)
ES28Governance, Risk, and Compliance (GRC) Evaluation, Planning and Development
ES29Security Software Development Life Cycle (SSDLC) Program Development
ES30IT Technical Documents Developments (Policy, Process, Procedure, Network Diagram, Data Flow Diagram)
ES31BCP or DR or Incident Response Plan Evaluation, or Testing, or Development
ES323rd Party Internal and External Red Team Pen Testing or Vulnerability Assessment
ES33Develop Change Control or Configuration Control Process
ES34One IT Security Technology Solution (Upgrade or Replace)
ES35IT Security Solutions, Products or Solution Evaluation, and Testing
ES36Cybersecurity Vendors Legal Contract Review or Development
ES37Any other client-defined objectives, which are not listed in this engagement
ES38Enterprise Risk Assessment (up to 5 sites)
ES39IT Infrastructure Vulnerability Scanning /or Remediation
ES40Web Application Vulnerability Scanning /or Remediation
ES41IT Security Infra Technology Upgrades or New Integration
ES42Security Awareness Program Development
ES43Vendor Security Program Development
ES44Cloud Vendor Security Risk Assessment ( up to five vendors)
ES45Business Partner Security Risk Assessment ( up to five partners)
ES46Nationwide Enterprise Risk Assessment (up to 5 sites)
ES47Enterprise Risk Register or Risk Calculator or Risk Workshop Development
ES48Global (overseas) Enterprise Risk Assessment (up to 2 sites, subject to add-on expenses for travel, lodging )
ES49GRDP SOX, PCI-DSS, or HIPAA Compliance Evaluation and Readiness
ES50Take an Interim Role as CIO, CISO, and V.P Cybersecurity IT Staff Augmentation
ES51Take an Interm IT Staff Replacement Role as Sr. Cyber Security Architect, Advisory, IT Manager or Engineer
ES52Interface with External Regulator, Auditors, and Other Authorities on your behalf on the given subject matter
ES53Be a Subject Matter Expert (SMEs) or Cybersecurity Advisory to Support Senior Management and Business
ES54Data Protection (Data Classification, Data Security, Data Flow, or Data Discovery)
ES55Assets Protection ( Asset Inventory, Management, and Security Control Analysis)
ES56Incident Investigation, Data Breach Analysis, and Records Preservation
ES57Cyber Threats Analysis
ES58Compliance Readiness / Analysis
ES59Governance, Risk, and Compliance (GRC)
ES60Enterprise Risk Assessment
ES61Cloud Application Risk Assessment
ES62IT Security Consulting, Audits, and Advisory
ES633rd Party External Audits
ES64NIST 800 Series Standards Deployments
ES65ISO 27005 Risk Management Program Development
ES66ISO 27000 IT Governance Program Development
ES67ISO 27001/02 Information Security Policy Program Development
ES68BS25999 Business Continuity Program Development
ES69Fraud Detection and Prevention
ES70Internal Security Risk Assessment Audits
ES71External (3rd party) Security Risk Assessment Audit and Certification
ES72Hacking and Authorized Penetrating Testing and Threats Assessment
ES73Vulnerabilities Risk Assessments - Internet Gateway Firewall / VPN
ES74Vulnerabilities Risk Assessments - Network Security
ES75Vulnerabilities Risk Assessments - Systems and End-Pont Desktops
ES76Vulnerabilities Risk Assessments - Web Applications /Web Services
ES77Vulnerabilities Risk Assessments - Cloud Application
ES78Vulnerabilities Risk Assessments - Cloud Data Securtity
ES79Vulnerabilities Risk Assessments - Data Security
ES80Vulnerabilities Risk Assessments - Vendor / Business Partner
ES81Penetrating Testing (Hacking) - Internet Gateway Firewall / VPN
ES82Penetrating Testing (Hacking) - Network Security
ES83Penetrating Testing (Hacking) - Systems and End-Pont Desktops
ES84Penetrating Testing (Hacking) - Web Applications /Web Services
ES85Penetrating Testing (Hacking) - Cloud Application
ES86Penetrating Testing (Hacking) - Cloud Data Securtity
ES87Penetrating Testing (Hacking) - Data Security
ES88Penetrating Testing (Hacking)- Vendor / Business Partner
ES89Risk Assessment and Mitigation Program Development and Management
ES90Gap Analysis
ES91Data Breach / Hack Incidents Investigation
ES92Control Audit and Analysis
ES93Process Audit and Analysis
ES94Businesses Impact Analysis (BIA)
ES95Data Impact Analysis (DIA)
ES96Privacy Impact Analysis (PIA)
ES97Control Analysis and Evaluation
ES98Development of Policies, Procedures, Standards, and Guidelines Development
ES99BCP/DRP Program Development & Management
ES100Fraud Detection and Prevention Risk Analysis
ES101IT Governance Security Best Practices
ES102IT Security Project Management
ES103IT Staff Augmentation and Technology Support
ES104Security Awareness Program Development
ES105On-Site Security Training and Knowledge Transfer
ES106Ground Zero to Simple or Complex Enterprise Start-Up
ES107IT Solutions Planning, Development, Implementation, Deployment, and Support
ES108Merger & Acquisition (M & A) – Business Partner Technologies Risk Analysis
ES109Security Policy Program
ES110Log Governance Program,
ES111Firewall Policy Governance Program
ES112Privacy Data Impact Program,
ES113Risk Assessment Program
ES114Vulnerability Mitigation Program,
ES115Change Management Program
ES116Business Continuity Planning Program,
ES117Disaster Recovery Program, Secure Software
ES118Development Program,
ES119Computer Security Incident Response Program
ES120Security & Privacy Awareness Program.
ES121Vendor Risk Assessment Program
ES122Black-Chaining Security Program,
ES123Cloud Service Provider Risk Assessment Program
ES124Legal Digital e-Discovery (Investigation Data Hack and Data Breaches)
ES125Legal Cybersecurity Contracting, Data Security, Data Protection
ES126Expert Witness Testimony & Reporting
ES127Service Provider(s) Risk Assessment Program
ES128Business Partners (s) Risk Assessment Program
ES129Cybersecurity / IT Staff Resource Augmentation
ES130Cloud Service Provider Risk Assessment Program
ES131Legal Digital e-Discovery (Investigation Data Hack and Data Breaches)
ES132Legal Cybersecurity Contracting, Data Security, Data Protection
ES133Expert Witness Testimony & Reporting
ES134Service Provider(s) Risk Assessment Program
ES135Business Partners (s) Risk Assessment Program
ES136Cybersecurity / IT Staff Resource Augmentation
ES137Other, Specify)
ES138
ES139
ES140
Right Menu Icon