Fee

NoTitle/Service/Product
Please note: The charges are for professional service work. An additional cost for each host license will also be applied.
DescriptionsPriceBuy Now
CONSULTING AND ADVISORY
CSE01Cyber Security Consulting ( 1 Hour)$300.00Buy
CSE02
CSE03INFORMATION TECHNOLOG (IT) PLANNING AND INTEGRATION
CSE04Please note: The charges are for professional service work. An additional cost for each host license will also be applied.
CSE05(IT) Information Technology - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE06Business Workflow /Processes Risk Evaluation - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE07Cyber Risk Evaluation - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE08Firewall / VPN - Planning, Integration and Support (20 Hours)Buy
CSE09Network Security - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE10Web Application Security - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE11Cloud Application Security - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE12Data Security - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE13Cloud Data Migration - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE14Email Migration - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE15Web Application Security - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE16Cybersecurity Technologies Upgrades or Integration, (50-100 Employees) (One Location, 40 Hours)$12,000.00Buy
CSE17Cybersecurity Compliance Readiness / or Gap Analysis (50-100 Employees),(One Location, 40 Hours)$12,000.00Buy
CSE18Cybersecurity Consulting and Compliance Support Services ( Onsite / Remote), 40 Hours$12,000.00Buy
CSE19
CSE20
CSE21
CSE22PROJECT MANAGEMENT
CSE23IT Project Management - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE24Compliance Management - Planning, Integration and Support (20 Hours)$6,000.00Buy
CSE25
CSE26VULNERABILITY SCANNING AND MITIGATION
CSE27Vulnerability Scanning and Mitigation - Network Security (100 Hours)$30,000.00Buy
CSE28Vulnerability Scanning and Mitigation - Systems Security (100 Hours)$30,000.00Buy
CSE29
CSE30Vulnerability Scanning and Mitigation - Database Security (100 Hours)$30,000.00Buy
CSE31Please note: The charges are for professional service work. An additional cost for each host license will also be applied.
CSE32
CSE33PENETRATION TESTING - (AUTHORIEZED HACKING)
CSE34Pen Testing - Network Security (100 Hours)$30,000.00Buy
CSE35Pen Testing- Systems Security (100 Hours)$30,000.00Buy
CSE36Pen Testing- Database Security (100 Hours)$30,000.00Buy
CSE37Pen Testing - Database Security (100 Hours)$30,000Buy
CSE38Please note: The charges are for professional service work. An additional cost for each host license will also be applied.
CSE39
CSE40
CSE41
CSE42
CSE43
CSE44
CSE45
CSE46CYBERSECURITY AUDITS
CSE47Cyber Audit (10 Hours)$3,000.00Buy
CSE48Cyber Audit ( 30 Hours )$9,000.00Buy
CSE49Cyber Audit ( 50 Hours)$15,000.00Buy
CSE50Cyber Audit ( 80 Hours)$24,000.00Buy
CSE51Cyber Audit (160 Hours)$48,000.00Buy
CSE52
CSE53
CSE54SMALL BUSINESS CYBERSECURITY SOLUTIONS
CSE55Cyber Risk Assessment -Retail Store ( One Location, 20 Hours)$6,000.00Buy
CSE56Cyber Risk Assessment- Medical Office ( One Location, 20 Hours)$6,000.00Buy
CSE57Cyber Risk Assessment -Law Office ( One Location, 20 Hours)$6,000.00Buy
CSE58Cyber Risk Assessment -Small Enterprise (50-100 Employees) (One Location, 160 Hours)$48,000.00Buy
CSE59
CSE60INDUSTRY REGULATORY COMPLIANCE
CSE61Health Care Provider HIPAA Security Risk Assessment (50-100 Employees), (One Location, 80 Hours)$24,000.00Buy
CSE62eCommerce PCI-DSS Security Risk Assessment (Small Business), (One Location, 80 Hours)$24,000.00Buy
CSE63California Data Privacy Security Risk Assessment (Small Business), (One Location, 80 Hours)$24,000.00Buy
CSE64Business Partners (Pre/Post) Merger and Acquisition Security Risk Assessment (One Location, 80 Hours)$24,000.00Buy
CSE65Educational Institution (FERPA) - Privacy Risk Assessment , (One Location, 80 Hours)$24,000.00Buy
CSE66California Consumer Privacy - Security Risk Assessment (One Location, 80 Hours)$24,000.00Buy
CSE67Online Business/ IT Technology Privacy- Security Risk Assessment (One Location, 80 Hours)$24,000.00Buy
CSE68
CSE69PRODUCTS AND SERVICE PACKAGES
CSE70Cybersecurity and Information Security (IS) Policies Program Framework (Over 50 Policies)$8,000.00Buy
CSE71Self-Audit - Infrastructure Security Assessment$5,000.00
CSE72Self-Audit - Application Security Risk Assessment$5,000.00
CSE73Self-Audit- Cloud Security Risk Assessment$5,000.00
CSE74Self-Audit - Vendors Security Risk Assessment$5,000.00
CSE75
CSE76
CSE77
CSE78
CSE79
CSE80
CSE81
CSE82
CSE83
CSE84
CSE85
CSE86
CSE87
CSE88
CSE89
CSE90
CSE91
CSE92
CSE93
CSE94
CSE95
CSE96
CSE97
CSE98
CSE99
CSE100
CSE101
CSE102
CSE103
CSE104
CSE105
CSE106TPS (1 Hour)$325.00Buy
BUILD AND ORDER YOUR OWN SERVICE PACKAGE
ES00Initial Consulting and Advisory (1 Hours)
ES01Meeting Key Senior Management- Enterprise Mission Objectives
ES02Meeting Key Business Management- Business Practices
ES03Meeting Key Technology Management- Current Technologies
ES04Meeting Key Security Management- Current Security Controls
ES05Gathering Key Technical Data (Diagram, Data Flow, Policies, Procedures)
ES06Reviewing & Analyzing the Information Across Cyber and Security Best Practices & Frameworks
ES07Reporting Current State and Propose State – Maturity Model & Identify Key Risks
ES08Recommendation of New or Revised Security Controls
ES09Recommendation of New IT & Security Solutions
ES10Any other client-defined objectives, which are not listed in this engagement
ES11High-Level Enterprise Risk Assessment (up to 3 sites)
ES12Enterprise Policy Review & Development
ES13IT Policy to IT Control (GRC) Compliance Framework Development
ES14Security Awareness Program Development
ES15Vendor Security Program Development
ES16Vendor Cloud Security Risk Assessment ( up to five vendors)
ES17Governance, Risk, and Compliance (GRC) Evaluation, Planning and Development
ES18Security Software Development Life Cycle (SSDLC) Program Development
ES19IT Technical Documents Developments (Policy, Process, Procedure, Network Diagram, Data Flow Diagram)
ES20BCP or DR or Incident Response Plan Evaluation, or Testing, or Development
ES213rd Party Internal and External Red Team Pen Testing or Vulnerability Assessment
ES22Develop Change Control or Configuration Control Process
ES23One IT Security Technology Solution (Upgrade or Replace)
ES24IT Security Solutions, Products or Solution Evaluation, and Testing
ES25Cybersecurity Vendors Legal Contract Review or Development
ES26Any other client-defined objectives, which are not listed in this engagement
ES27Enterprise Risk Assessment (up to 5 sites)
ES28IT Infrastructure Vulnerability Scanning /or Remediation
ES29Web Application Vulnerability Scanning /or Remediation
ES30IT Security Infra Technology Upgrades or New Integration
ES31Security Awareness Program Development
ES32Vendor Security Program Development
ES33Cloud Vendor Security Risk Assessment ( up to five vendors)
ES34Business Partner Security Risk Assessment ( up to five partners)
ES35Nationwide Enterprise Risk Assessment (up to 5 sites)
ES36Enterprise Risk Register or Risk Calculator or Risk Workshop Development
ES37Global (overseas) Enterprise Risk Assessment (up to 2 sites, subject to add-on expenses for travel, lodging )
ES38GRDP SOX, PCI-DSS, or HIPAA Compliance Evaluation and Readiness
ES39Take an Interim Role as CIO, CISO, and V.P Cybersecurity IT Staff Augmentation
ES40Take an Interm IT Staff Replacement Role as Sr. Cyber Security Architect, Advisory, IT Manager or Engineer
ES41Interface with External Regulator, Auditors, and Other Authorities on your behalf on the given subject matter
ES42Be a Subject Matter Expert (SMEs) or Cybersecurity Advisory to Support Senior Management and Business
ES43Data Protection (Data Classification, Data Security, Data Flow, or Data Discovery)
ES44Assets Protection ( Asset Inventory, Management, and Security Control Analysis)
ES45Incident Investigation, Data Breach Analysis, and Records Preservation
ES46Cyber Threats Analysis
ES47Compliance Readiness / Analysis
ES48Governance, Risk, and Compliance (GRC)
ES49Enterprise Risk Assessment
ES50Cloud Application Risk Assessment
ES51IT Security Consulting, Audits, and Advisory
ES523rd Party External Audits
ES53NIST 800 Series Standards Deployments
ES54ISO 27005 Risk Management Program Development
ES55ISO 27000 IT Governance Program Development
ES56ISO 27001/02 Information Security Policy Program Development
ES57BS25999 Business Continuity Program Development
ES58Fraud Detection and Prevention
ES59Internal Security Risk Assessment Audits
ES60External (3rd party) Security Risk Assessment Audit and Certification
ES61Hacking and Authorized Penetrating Testing and Threats Assessment
ES62Vulnerabilities Risk Assessments - Internet Gateway Firewall / VPN
ES63Vulnerabilities Risk Assessments - Network Security
ES64Vulnerabilities Risk Assessments - Systems and End-Pont Desktops
ES65Vulnerabilities Risk Assessments - Web Applications /Web Services
ES66Vulnerabilities Risk Assessments - Cloud Application
ES67Vulnerabilities Risk Assessments - Cloud Data Securtity
ES68Vulnerabilities Risk Assessments - Data Security
ES69Vulnerabilities Risk Assessments - Vendor / Business Partner
ES70Penetrating Testing (Hacking) - Internet Gateway Firewall / VPN
ES71Penetrating Testing (Hacking) - Network Security
ES72Penetrating Testing (Hacking) - Systems and End-Pont Desktops
ES73Penetrating Testing (Hacking) - Web Applications /Web Services
ES74Penetrating Testing (Hacking) - Cloud Application
ES75Penetrating Testing (Hacking) - Cloud Data Securtity
ES76Penetrating Testing (Hacking) - Data Security
ES77Penetrating Testing (Hacking)- Vendor / Business Partner
ES78Risk Assessment and Mitigation Program Development and Management
ES79Gap Analysis
ES80Data Breach / Hack Incidents Investigation
ES81Control Audit and Analysis
ES82Process Audit and Analysis
ES83Businesses Impact Analysis (BIA)
ES84Data Impact Analysis (DIA)
ES85Privacy Impact Analysis (PIA)
ES86Control Analysis and Evaluation
ES87Development of Policies, Procedures, Standards, and Guidelines Development
ES88BCP/DRP Program Development & Management
ES89Fraud Detection and Prevention Risk Analysis
ES90IT Governance Security Best Practices
ES91IT Security Project Management
ES92IT Staff Augmentation and Technology Support
ES93Security Awareness Program Development
ES94On-Site Security Training and Knowledge Transfer
ES95Ground Zero to Simple or Complex Enterprise Start-Up
ES96IT Solutions Planning, Development, Implementation, Deployment, and Support
ES97Merger & Acquisition (M & A) – Business Partner Technologies Risk Analysis
ES98Security Policy Program
ES99Log Governance Program,
ES100Firewall Policy Governance Program
ES101Privacy Data Impact Program,
ES102Risk Assessment Program
ES103Vulnerability Mitigation Program,
ES104Change Management Program
ES105Business Continuity Planning Program,
ES106Disaster Recovery Program, Secure Software
ES107Development Program,
ES108Computer Security Incident Response Program
ES109Security & Privacy Awareness Program.
ES110Vendor Risk Assessment Program
ES111Black-Chaining Security Program,
ES112Cloud Service Provider Risk Assessment Program
ES113Legal Digital e-Discovery (Investigation Data Hack and Data Breaches)
ES114Legal Cybersecurity Contracting, Data Security, Data Protection
ES115Expert Witness Testimony & Reporting
ES116Service Provider(s) Risk Assessment Program
ES117Business Partners (s) Risk Assessment Program
ES118Cybersecurity / IT Staff Resource Augmentation
ES119Cloud Service Provider Risk Assessment Program
ES120Legal Digital e-Discovery (Investigation Data Hack and Data Breaches)
ES121Legal Cybersecurity Contracting, Data Security, Data Protection
ES122Expert Witness Testimony & Reporting
ES123Service Provider(s) Risk Assessment Program
ES124Business Partners (s) Risk Assessment Program
ES125Cybersecurity / IT Staff Resource Augmentation
Right Menu Icon