No | Title/Service/Product Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | Descriptions | Price | Buy Now |
---|---|---|---|---|
CONSULTING AND ADVISORY | ||||
CSE01 | Cyber Security Consulting ( 1 Hour) | $300.00 | Buy | |
CSE02 | ||||
CSE03 | INFORMATION TECHNOLOG (IT) PLANNING AND INTEGRATION | |||
CSE04 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
CSE05 | (IT) Information Technology - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE06 | Business Workflow /Processes Risk Evaluation - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE07 | Cyber Risk Evaluation - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE08 | Firewall / VPN - Planning, Integration and Support (20 Hours) | Buy | ||
CSE09 | Network Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE10 | Web Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE11 | Cloud Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE12 | Data Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE13 | Cloud Data Migration - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE14 | Email Migration - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE15 | Web Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE16 | Cybersecurity Technologies Upgrades or Integration, (50-100 Employees) (One Location, 40 Hours) | $12,000.00 | Buy | |
CSE17 | Cybersecurity Compliance Readiness / or Gap Analysis (50-100 Employees),(One Location, 40 Hours) | $12,000.00 | Buy | |
CSE18 | Cybersecurity Consulting and Compliance Support Services ( Onsite / Remote), 40 Hours | $12,000.00 | Buy | |
CSE19 | ||||
CSE20 | ||||
CSE21 | ||||
CSE22 | PROJECT MANAGEMENT | |||
CSE23 | IT Project Management - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE24 | Compliance Management - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
CSE25 | ||||
CSE26 | VULNERABILITY SCANNING AND MITIGATION | |||
CSE27 | Vulnerability Scanning and Mitigation - Network Security (100 Hours) | $30,000.00 | Buy | |
CSE28 | Vulnerability Scanning and Mitigation - Systems Security (100 Hours) | $30,000.00 | Buy | |
CSE29 | ||||
CSE30 | Vulnerability Scanning and Mitigation - Database Security (100 Hours) | $30,000.00 | Buy | |
CSE31 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
CSE32 | ||||
CSE33 | PENETRATION TESTING - (AUTHORIEZED HACKING) | |||
CSE34 | Pen Testing - Network Security (100 Hours) | $30,000.00 | Buy | |
CSE35 | Pen Testing- Systems Security (100 Hours) | $30,000.00 | Buy | |
CSE36 | Pen Testing- Database Security (100 Hours) | $30,000.00 | Buy | |
CSE37 | Pen Testing - Database Security (100 Hours) | $30,000 | Buy | |
CSE38 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
CSE39 | ||||
CSE40 | ||||
CSE41 | ||||
CSE42 | ||||
CSE43 | ||||
CSE44 | ||||
CSE45 | ||||
CSE46 | CYBERSECURITY AUDITS | |||
CSE47 | Cyber Audit (10 Hours) | $3,000.00 | Buy | |
CSE48 | Cyber Audit ( 30 Hours ) | $9,000.00 | Buy | |
CSE49 | Cyber Audit ( 50 Hours) | $15,000.00 | Buy | |
CSE50 | Cyber Audit ( 80 Hours) | $24,000.00 | Buy | |
CSE51 | Cyber Audit (160 Hours) | $48,000.00 | Buy | |
CSE52 | ||||
CSE53 | ||||
CSE54 | SMALL BUSINESS CYBERSECURITY SOLUTIONS | |||
CSE55 | Cyber Risk Assessment -Retail Store ( One Location, 20 Hours) | $6,000.00 | Buy | |
CSE56 | Cyber Risk Assessment- Medical Office ( One Location, 20 Hours) | $6,000.00 | Buy | |
CSE57 | Cyber Risk Assessment -Law Office ( One Location, 20 Hours) | $6,000.00 | Buy | |
CSE58 | Cyber Risk Assessment -Small Enterprise (50-100 Employees) (One Location, 160 Hours) | $48,000.00 | Buy | |
CSE59 | ||||
CSE60 | INDUSTRY REGULATORY COMPLIANCE | |||
CSE61 | Health Care Provider HIPAA Security Risk Assessment (50-100 Employees), (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE62 | eCommerce PCI-DSS Security Risk Assessment (Small Business), (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE63 | California Data Privacy Security Risk Assessment (Small Business), (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE64 | Business Partners (Pre/Post) Merger and Acquisition Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE65 | Educational Institution (FERPA) - Privacy Risk Assessment , (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE66 | California Consumer Privacy - Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE67 | Online Business/ IT Technology Privacy- Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
CSE68 | ||||
CSE69 | PRODUCTS AND SERVICE PACKAGES | |||
CSE70 | Cybersecurity and Information Security (IS) Policies Program Framework (Over 50 Policies) | $8,000.00 | Buy | |
CSE71 | Self-Audit - Infrastructure Security Assessment | $5,000.00 | ||
CSE72 | Self-Audit - Application Security Risk Assessment | $5,000.00 | ||
CSE73 | Self-Audit- Cloud Security Risk Assessment | $5,000.00 | ||
CSE74 | Self-Audit - Vendors Security Risk Assessment | $5,000.00 | ||
CSE75 | ||||
CSE76 | ||||
CSE77 | ||||
CSE78 | ||||
CSE79 | ||||
CSE80 | ||||
CSE81 | ||||
CSE82 | ||||
CSE83 | ||||
CSE84 | ||||
CSE85 | ||||
CSE86 | ||||
CSE87 | ||||
CSE88 | ||||
CSE89 | ||||
CSE90 | ||||
CSE91 | ||||
CSE92 | ||||
CSE93 | ||||
CSE94 | ||||
CSE95 | ||||
CSE96 | ||||
CSE97 | ||||
CSE98 | ||||
CSE99 | ||||
CSE100 | ||||
CSE101 | ||||
CSE102 | ||||
CSE103 | ||||
CSE104 | ||||
CSE105 | ||||
CSE106 | TPS (1 Hour) | $325.00 | Buy | |
BUILD AND ORDER YOUR OWN SERVICE PACKAGE | ||||
ES00 | Initial Consulting and Advisory (1 Hours) | |||
ES01 | Meeting Key Senior Management- Enterprise Mission Objectives | |||
ES02 | Meeting Key Business Management- Business Practices | |||
ES03 | Meeting Key Technology Management- Current Technologies | |||
ES04 | Meeting Key Security Management- Current Security Controls | |||
ES05 | Gathering Key Technical Data (Diagram, Data Flow, Policies, Procedures) | |||
ES06 | Reviewing & Analyzing the Information Across Cyber and Security Best Practices & Frameworks | |||
ES07 | Reporting Current State and Propose State – Maturity Model & Identify Key Risks | |||
ES08 | Recommendation of New or Revised Security Controls | |||
ES09 | Recommendation of New IT & Security Solutions | |||
ES10 | Any other client-defined objectives, which are not listed in this engagement | |||
ES11 | High-Level Enterprise Risk Assessment (up to 3 sites) | |||
ES12 | Enterprise Policy Review & Development | |||
ES13 | IT Policy to IT Control (GRC) Compliance Framework Development | |||
ES14 | Security Awareness Program Development | |||
ES15 | Vendor Security Program Development | |||
ES16 | Vendor Cloud Security Risk Assessment ( up to five vendors) | |||
ES17 | Governance, Risk, and Compliance (GRC) Evaluation, Planning and Development | |||
ES18 | Security Software Development Life Cycle (SSDLC) Program Development | |||
ES19 | IT Technical Documents Developments (Policy, Process, Procedure, Network Diagram, Data Flow Diagram) | |||
ES20 | BCP or DR or Incident Response Plan Evaluation, or Testing, or Development | |||
ES21 | 3rd Party Internal and External Red Team Pen Testing or Vulnerability Assessment | |||
ES22 | Develop Change Control or Configuration Control Process | |||
ES23 | One IT Security Technology Solution (Upgrade or Replace) | |||
ES24 | IT Security Solutions, Products or Solution Evaluation, and Testing | |||
ES25 | Cybersecurity Vendors Legal Contract Review or Development | |||
ES26 | Any other client-defined objectives, which are not listed in this engagement | |||
ES27 | Enterprise Risk Assessment (up to 5 sites) | |||
ES28 | IT Infrastructure Vulnerability Scanning /or Remediation | |||
ES29 | Web Application Vulnerability Scanning /or Remediation | |||
ES30 | IT Security Infra Technology Upgrades or New Integration | |||
ES31 | Security Awareness Program Development | |||
ES32 | Vendor Security Program Development | |||
ES33 | Cloud Vendor Security Risk Assessment ( up to five vendors) | |||
ES34 | Business Partner Security Risk Assessment ( up to five partners) | |||
ES35 | Nationwide Enterprise Risk Assessment (up to 5 sites) | |||
ES36 | Enterprise Risk Register or Risk Calculator or Risk Workshop Development | |||
ES37 | Global (overseas) Enterprise Risk Assessment (up to 2 sites, subject to add-on expenses for travel, lodging ) | |||
ES38 | GRDP SOX, PCI-DSS, or HIPAA Compliance Evaluation and Readiness | |||
ES39 | Take an Interim Role as CIO, CISO, and V.P Cybersecurity IT Staff Augmentation | |||
ES40 | Take an Interm IT Staff Replacement Role as Sr. Cyber Security Architect, Advisory, IT Manager or Engineer | |||
ES41 | Interface with External Regulator, Auditors, and Other Authorities on your behalf on the given subject matter | |||
ES42 | Be a Subject Matter Expert (SMEs) or Cybersecurity Advisory to Support Senior Management and Business | |||
ES43 | Data Protection (Data Classification, Data Security, Data Flow, or Data Discovery) | |||
ES44 | Assets Protection ( Asset Inventory, Management, and Security Control Analysis) | |||
ES45 | Incident Investigation, Data Breach Analysis, and Records Preservation | |||
ES46 | Cyber Threats Analysis | |||
ES47 | Compliance Readiness / Analysis | |||
ES48 | Governance, Risk, and Compliance (GRC) | |||
ES49 | Enterprise Risk Assessment | |||
ES50 | Cloud Application Risk Assessment | |||
ES51 | IT Security Consulting, Audits, and Advisory | |||
ES52 | 3rd Party External Audits | |||
ES53 | NIST 800 Series Standards Deployments | |||
ES54 | ISO 27005 Risk Management Program Development | |||
ES55 | ISO 27000 IT Governance Program Development | |||
ES56 | ISO 27001/02 Information Security Policy Program Development | |||
ES57 | BS25999 Business Continuity Program Development | |||
ES58 | Fraud Detection and Prevention | |||
ES59 | Internal Security Risk Assessment Audits | |||
ES60 | External (3rd party) Security Risk Assessment Audit and Certification | |||
ES61 | Hacking and Authorized Penetrating Testing and Threats Assessment | |||
ES62 | Vulnerabilities Risk Assessments - Internet Gateway Firewall / VPN | |||
ES63 | Vulnerabilities Risk Assessments - Network Security | |||
ES64 | Vulnerabilities Risk Assessments - Systems and End-Pont Desktops | |||
ES65 | Vulnerabilities Risk Assessments - Web Applications /Web Services | |||
ES66 | Vulnerabilities Risk Assessments - Cloud Application | |||
ES67 | Vulnerabilities Risk Assessments - Cloud Data Securtity | |||
ES68 | Vulnerabilities Risk Assessments - Data Security | |||
ES69 | Vulnerabilities Risk Assessments - Vendor / Business Partner | |||
ES70 | Penetrating Testing (Hacking) - Internet Gateway Firewall / VPN | |||
ES71 | Penetrating Testing (Hacking) - Network Security | |||
ES72 | Penetrating Testing (Hacking) - Systems and End-Pont Desktops | |||
ES73 | Penetrating Testing (Hacking) - Web Applications /Web Services | |||
ES74 | Penetrating Testing (Hacking) - Cloud Application | |||
ES75 | Penetrating Testing (Hacking) - Cloud Data Securtity | |||
ES76 | Penetrating Testing (Hacking) - Data Security | |||
ES77 | Penetrating Testing (Hacking)- Vendor / Business Partner | |||
ES78 | Risk Assessment and Mitigation Program Development and Management | |||
ES79 | Gap Analysis | |||
ES80 | Data Breach / Hack Incidents Investigation | |||
ES81 | Control Audit and Analysis | |||
ES82 | Process Audit and Analysis | |||
ES83 | Businesses Impact Analysis (BIA) | |||
ES84 | Data Impact Analysis (DIA) | |||
ES85 | Privacy Impact Analysis (PIA) | |||
ES86 | Control Analysis and Evaluation | |||
ES87 | Development of Policies, Procedures, Standards, and Guidelines Development | |||
ES88 | BCP/DRP Program Development & Management | |||
ES89 | Fraud Detection and Prevention Risk Analysis | |||
ES90 | IT Governance Security Best Practices | |||
ES91 | IT Security Project Management | |||
ES92 | IT Staff Augmentation and Technology Support | |||
ES93 | Security Awareness Program Development | |||
ES94 | On-Site Security Training and Knowledge Transfer | |||
ES95 | Ground Zero to Simple or Complex Enterprise Start-Up | |||
ES96 | IT Solutions Planning, Development, Implementation, Deployment, and Support | |||
ES97 | Merger & Acquisition (M & A) – Business Partner Technologies Risk Analysis | |||
ES98 | Security Policy Program | |||
ES99 | Log Governance Program, | |||
ES100 | Firewall Policy Governance Program | |||
ES101 | Privacy Data Impact Program, | |||
ES102 | Risk Assessment Program | |||
ES103 | Vulnerability Mitigation Program, | |||
ES104 | Change Management Program | |||
ES105 | Business Continuity Planning Program, | |||
ES106 | Disaster Recovery Program, Secure Software | |||
ES107 | Development Program, | |||
ES108 | Computer Security Incident Response Program | |||
ES109 | Security & Privacy Awareness Program. | |||
ES110 | Vendor Risk Assessment Program | |||
ES111 | Black-Chaining Security Program, | |||
ES112 | Cloud Service Provider Risk Assessment Program | |||
ES113 | Legal Digital e-Discovery (Investigation Data Hack and Data Breaches) | |||
ES114 | Legal Cybersecurity Contracting, Data Security, Data Protection | |||
ES115 | Expert Witness Testimony & Reporting | |||
ES116 | Service Provider(s) Risk Assessment Program | |||
ES117 | Business Partners (s) Risk Assessment Program | |||
ES118 | Cybersecurity / IT Staff Resource Augmentation | |||
ES119 | Cloud Service Provider Risk Assessment Program | |||
ES120 | Legal Digital e-Discovery (Investigation Data Hack and Data Breaches) | |||
ES121 | Legal Cybersecurity Contracting, Data Security, Data Protection | |||
ES122 | Expert Witness Testimony & Reporting | |||
ES123 | Service Provider(s) Risk Assessment Program | |||
ES124 | Business Partners (s) Risk Assessment Program | |||
ES125 | Cybersecurity / IT Staff Resource Augmentation | |||