| No | Title/Service/Product Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | Descriptions | Price | Buy Now |
|---|---|---|---|---|
| CONSULTING AND ADVISORY | ||||
| CSE01 | Cyber Security Consulting ( 1 Hour) | $300.00 | Buy | |
| CSE02 | ||||
| CSE03 | INFORMATION TECHNOLOG (IT) PLANNING AND INTEGRATION | |||
| CSE04 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
| CSE05 | (IT) Information Technology - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE06 | Business Workflow /Processes Risk Evaluation - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE07 | Cyber Risk Evaluation - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE08 | Firewall / VPN - Planning, Integration and Support (20 Hours) | Buy | ||
| CSE09 | Network Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE10 | Web Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE11 | Cloud Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE12 | Data Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE13 | Cloud Data Migration - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE14 | Email Migration - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE15 | Web Application Security - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE16 | Cybersecurity Technologies Upgrades or Integration, (50-100 Employees) (One Location, 40 Hours) | $12,000.00 | Buy | |
| CSE17 | Cybersecurity Compliance Readiness / or Gap Analysis (50-100 Employees),(One Location, 40 Hours) | $12,000.00 | Buy | |
| CSE18 | Cybersecurity Consulting and Compliance Support Services ( Onsite / Remote), 40 Hours | $12,000.00 | Buy | |
| CSE19 | ||||
| CSE20 | ||||
| CSE21 | ||||
| CSE22 | PROJECT MANAGEMENT | |||
| CSE23 | IT Project Management - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE24 | Compliance Management - Planning, Integration and Support (20 Hours) | $6,000.00 | Buy | |
| CSE25 | ||||
| CSE26 | VULNERABILITY SCANNING AND MITIGATION | |||
| CSE27 | Vulnerability Scanning and Mitigation - Network Security (100 Hours) | $30,000.00 | Buy | |
| CSE28 | Vulnerability Scanning and Mitigation - Systems Security (100 Hours) | $30,000.00 | Buy | |
| CSE29 | ||||
| CSE30 | Vulnerability Scanning and Mitigation - Database Security (100 Hours) | $30,000.00 | Buy | |
| CSE31 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
| CSE32 | ||||
| CSE33 | PENETRATION TESTING - (AUTHORIEZED HACKING) | |||
| CSE34 | Pen Testing - Network Security (100 Hours) | $30,000.00 | Buy | |
| CSE35 | Pen Testing- Systems Security (100 Hours) | $30,000.00 | Buy | |
| CSE36 | Pen Testing- Database Security (100 Hours) | $30,000.00 | Buy | |
| CSE37 | Pen Testing - Database Security (100 Hours) | $30,000 | Buy | |
| CSE38 | Please note: The charges are for professional service work. An additional cost for each host license will also be applied. | |||
| CSE39 | ||||
| CSE40 | ||||
| CSE41 | ||||
| CSE42 | ||||
| CSE43 | ||||
| CSE44 | ||||
| CSE45 | ||||
| CSE46 | CYBERSECURITY AUDITS | |||
| CSE47 | Cyber Audit (10 Hours) | $3,000.00 | Buy | |
| CSE48 | Cyber Audit ( 30 Hours ) | $9,000.00 | Buy | |
| CSE49 | Cyber Audit ( 50 Hours) | $15,000.00 | Buy | |
| CSE50 | Cyber Audit ( 80 Hours) | $24,000.00 | Buy | |
| CSE51 | Cyber Audit (160 Hours) | $48,000.00 | Buy | |
| CSE52 | ||||
| CSE53 | ||||
| CSE54 | SMALL BUSINESS CYBERSECURITY SOLUTIONS | |||
| CSE55 | Cyber Risk Assessment -Retail Store ( One Location, 20 Hours) | $6,000.00 | Buy | |
| CSE56 | Cyber Risk Assessment- Medical Office ( One Location, 20 Hours) | $6,000.00 | Buy | |
| CSE57 | Cyber Risk Assessment -Law Office ( One Location, 20 Hours) | $6,000.00 | Buy | |
| CSE58 | Cyber Risk Assessment -Small Enterprise (50-100 Employees) (One Location, 160 Hours) | $48,000.00 | Buy | |
| CSE59 | ||||
| CSE60 | INDUSTRY REGULATORY COMPLIANCE | |||
| CSE61 | Health Care Provider HIPAA Security Risk Assessment (50-100 Employees), (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE62 | eCommerce PCI-DSS Security Risk Assessment (Small Business), (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE63 | California Data Privacy Security Risk Assessment (Small Business), (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE64 | Business Partners (Pre/Post) Merger and Acquisition Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE65 | Educational Institution (FERPA) - Privacy Risk Assessment , (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE66 | California Consumer Privacy - Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE67 | Online Business/ IT Technology Privacy- Security Risk Assessment (One Location, 80 Hours) | $24,000.00 | Buy | |
| CSE68 | ||||
| CSE69 | PRODUCTS AND SERVICE PACKAGES | |||
| CSE70 | Cybersecurity and Information Security (IS) Policies Program Framework (Over 50 Policies) | $8,000.00 | Buy | |
| CSE71 | Self-Audit - Infrastructure Security Assessment | $5,000.00 | ||
| CSE72 | Self-Audit - Application Security Risk Assessment | $5,000.00 | ||
| CSE73 | Self-Audit- Cloud Security Risk Assessment | $5,000.00 | ||
| CSE74 | Self-Audit - Vendors Security Risk Assessment | $5,000.00 | ||
| CSE75 | ||||
| CSE76 | ||||
| CSE77 | ||||
| CSE78 | ||||
| CSE79 | ||||
| CSE80 | ||||
| CSE81 | ||||
| CSE82 | ||||
| CSE83 | ||||
| CSE84 | ||||
| CSE85 | ||||
| CSE86 | ||||
| CSE87 | ||||
| CSE88 | ||||
| CSE89 | ||||
| CSE90 | ||||
| CSE91 | ||||
| CSE92 | ||||
| CSE93 | ||||
| CSE94 | ||||
| CSE95 | ||||
| CSE96 | ||||
| CSE97 | ||||
| CSE98 | ||||
| CSE99 | ||||
| CSE100 | ||||
| CSE101 | ||||
| CSE102 | ||||
| CSE103 | ||||
| CSE104 | ||||
| CSE105 | ||||
| CSE106 | TPS (1 Hour) | $325.00 | Buy | |
| BUILD AND ORDER YOUR OWN SERVICE PACKAGE | ||||
| ES00 | Initial Consulting and Advisory (1 Hours) | |||
| ES01 | Meeting Key Senior Management- Enterprise Mission Objectives | |||
| ES02 | Meeting Key Business Management- Business Practices | |||
| ES03 | Meeting Key Technology Management- Current Technologies | |||
| ES04 | Meeting Key Security Management- Current Security Controls | |||
| ES05 | Gathering Key Technical Data (Diagram, Data Flow, Policies, Procedures) | |||
| ES06 | Reviewing & Analyzing the Information Across Cyber and Security Best Practices & Frameworks | |||
| ES07 | Reporting Current State and Propose State – Maturity Model & Identify Key Risks | |||
| ES08 | Recommendation of New or Revised Security Controls | |||
| ES09 | Recommendation of New IT & Security Solutions | |||
| ES10 | Any other client-defined objectives, which are not listed in this engagement | |||
| ES11 | High-Level Enterprise Risk Assessment (up to 3 sites) | |||
| ES12 | Enterprise Policy Review & Development | |||
| ES13 | IT Policy to IT Control (GRC) Compliance Framework Development | |||
| ES14 | Security Awareness Program Development | |||
| ES15 | Vendor Security Program Development | |||
| ES16 | Vendor Cloud Security Risk Assessment ( up to five vendors) | |||
| ES17 | Governance, Risk, and Compliance (GRC) Evaluation, Planning and Development | |||
| ES18 | Security Software Development Life Cycle (SSDLC) Program Development | |||
| ES19 | IT Technical Documents Developments (Policy, Process, Procedure, Network Diagram, Data Flow Diagram) | |||
| ES20 | BCP or DR or Incident Response Plan Evaluation, or Testing, or Development | |||
| ES21 | 3rd Party Internal and External Red Team Pen Testing or Vulnerability Assessment | |||
| ES22 | Develop Change Control or Configuration Control Process | |||
| ES23 | One IT Security Technology Solution (Upgrade or Replace) | |||
| ES24 | IT Security Solutions, Products or Solution Evaluation, and Testing | |||
| ES25 | Cybersecurity Vendors Legal Contract Review or Development | |||
| ES26 | Any other client-defined objectives, which are not listed in this engagement | |||
| ES27 | Enterprise Risk Assessment (up to 5 sites) | |||
| ES28 | IT Infrastructure Vulnerability Scanning /or Remediation | |||
| ES29 | Web Application Vulnerability Scanning /or Remediation | |||
| ES30 | IT Security Infra Technology Upgrades or New Integration | |||
| ES31 | Security Awareness Program Development | |||
| ES32 | Vendor Security Program Development | |||
| ES33 | Cloud Vendor Security Risk Assessment ( up to five vendors) | |||
| ES34 | Business Partner Security Risk Assessment ( up to five partners) | |||
| ES35 | Nationwide Enterprise Risk Assessment (up to 5 sites) | |||
| ES36 | Enterprise Risk Register or Risk Calculator or Risk Workshop Development | |||
| ES37 | Global (overseas) Enterprise Risk Assessment (up to 2 sites, subject to add-on expenses for travel, lodging ) | |||
| ES38 | GRDP SOX, PCI-DSS, or HIPAA Compliance Evaluation and Readiness | |||
| ES39 | Take an Interim Role as CIO, CISO, and V.P Cybersecurity IT Staff Augmentation | |||
| ES40 | Take an Interm IT Staff Replacement Role as Sr. Cyber Security Architect, Advisory, IT Manager or Engineer | |||
| ES41 | Interface with External Regulator, Auditors, and Other Authorities on your behalf on the given subject matter | |||
| ES42 | Be a Subject Matter Expert (SMEs) or Cybersecurity Advisory to Support Senior Management and Business | |||
| ES43 | Data Protection (Data Classification, Data Security, Data Flow, or Data Discovery) | |||
| ES44 | Assets Protection ( Asset Inventory, Management, and Security Control Analysis) | |||
| ES45 | Incident Investigation, Data Breach Analysis, and Records Preservation | |||
| ES46 | Cyber Threats Analysis | |||
| ES47 | Compliance Readiness / Analysis | |||
| ES48 | Governance, Risk, and Compliance (GRC) | |||
| ES49 | Enterprise Risk Assessment | |||
| ES50 | Cloud Application Risk Assessment | |||
| ES51 | IT Security Consulting, Audits, and Advisory | |||
| ES52 | 3rd Party External Audits | |||
| ES53 | NIST 800 Series Standards Deployments | |||
| ES54 | ISO 27005 Risk Management Program Development | |||
| ES55 | ISO 27000 IT Governance Program Development | |||
| ES56 | ISO 27001/02 Information Security Policy Program Development | |||
| ES57 | BS25999 Business Continuity Program Development | |||
| ES58 | Fraud Detection and Prevention | |||
| ES59 | Internal Security Risk Assessment Audits | |||
| ES60 | External (3rd party) Security Risk Assessment Audit and Certification | |||
| ES61 | Hacking and Authorized Penetrating Testing and Threats Assessment | |||
| ES62 | Vulnerabilities Risk Assessments - Internet Gateway Firewall / VPN | |||
| ES63 | Vulnerabilities Risk Assessments - Network Security | |||
| ES64 | Vulnerabilities Risk Assessments - Systems and End-Pont Desktops | |||
| ES65 | Vulnerabilities Risk Assessments - Web Applications /Web Services | |||
| ES66 | Vulnerabilities Risk Assessments - Cloud Application | |||
| ES67 | Vulnerabilities Risk Assessments - Cloud Data Securtity | |||
| ES68 | Vulnerabilities Risk Assessments - Data Security | |||
| ES69 | Vulnerabilities Risk Assessments - Vendor / Business Partner | |||
| ES70 | Penetrating Testing (Hacking) - Internet Gateway Firewall / VPN | |||
| ES71 | Penetrating Testing (Hacking) - Network Security | |||
| ES72 | Penetrating Testing (Hacking) - Systems and End-Pont Desktops | |||
| ES73 | Penetrating Testing (Hacking) - Web Applications /Web Services | |||
| ES74 | Penetrating Testing (Hacking) - Cloud Application | |||
| ES75 | Penetrating Testing (Hacking) - Cloud Data Securtity | |||
| ES76 | Penetrating Testing (Hacking) - Data Security | |||
| ES77 | Penetrating Testing (Hacking)- Vendor / Business Partner | |||
| ES78 | Risk Assessment and Mitigation Program Development and Management | |||
| ES79 | Gap Analysis | |||
| ES80 | Data Breach / Hack Incidents Investigation | |||
| ES81 | Control Audit and Analysis | |||
| ES82 | Process Audit and Analysis | |||
| ES83 | Businesses Impact Analysis (BIA) | |||
| ES84 | Data Impact Analysis (DIA) | |||
| ES85 | Privacy Impact Analysis (PIA) | |||
| ES86 | Control Analysis and Evaluation | |||
| ES87 | Development of Policies, Procedures, Standards, and Guidelines Development | |||
| ES88 | BCP/DRP Program Development & Management | |||
| ES89 | Fraud Detection and Prevention Risk Analysis | |||
| ES90 | IT Governance Security Best Practices | |||
| ES91 | IT Security Project Management | |||
| ES92 | IT Staff Augmentation and Technology Support | |||
| ES93 | Security Awareness Program Development | |||
| ES94 | On-Site Security Training and Knowledge Transfer | |||
| ES95 | Ground Zero to Simple or Complex Enterprise Start-Up | |||
| ES96 | IT Solutions Planning, Development, Implementation, Deployment, and Support | |||
| ES97 | Merger & Acquisition (M & A) – Business Partner Technologies Risk Analysis | |||
| ES98 | Security Policy Program | |||
| ES99 | Log Governance Program, | |||
| ES100 | Firewall Policy Governance Program | |||
| ES101 | Privacy Data Impact Program, | |||
| ES102 | Risk Assessment Program | |||
| ES103 | Vulnerability Mitigation Program, | |||
| ES104 | Change Management Program | |||
| ES105 | Business Continuity Planning Program, | |||
| ES106 | Disaster Recovery Program, Secure Software | |||
| ES107 | Development Program, | |||
| ES108 | Computer Security Incident Response Program | |||
| ES109 | Security & Privacy Awareness Program. | |||
| ES110 | Vendor Risk Assessment Program | |||
| ES111 | Black-Chaining Security Program, | |||
| ES112 | Cloud Service Provider Risk Assessment Program | |||
| ES113 | Legal Digital e-Discovery (Investigation Data Hack and Data Breaches) | |||
| ES114 | Legal Cybersecurity Contracting, Data Security, Data Protection | |||
| ES115 | Expert Witness Testimony & Reporting | |||
| ES116 | Service Provider(s) Risk Assessment Program | |||
| ES117 | Business Partners (s) Risk Assessment Program | |||
| ES118 | Cybersecurity / IT Staff Resource Augmentation | |||
| ES119 | Cloud Service Provider Risk Assessment Program | |||
| ES120 | Legal Digital e-Discovery (Investigation Data Hack and Data Breaches) | |||
| ES121 | Legal Cybersecurity Contracting, Data Security, Data Protection | |||
| ES122 | Expert Witness Testimony & Reporting | |||
| ES123 | Service Provider(s) Risk Assessment Program | |||
| ES124 | Business Partners (s) Risk Assessment Program | |||
| ES125 | Cybersecurity / IT Staff Resource Augmentation | |||