You will get Cybersecurity and Compliance vCISO

David F.Status: Offline
David F.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from David, priced and ready to go.

You will get Cybersecurity and Compliance vCISO

David F.Status: Offline
David F.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from David, priced and ready to go.

Project details

Through the Gap Analysis, you will gain a clear understanding of your current Security and Compliance posture as it relates to your Compliance and Governance requirements. Based on the findings from the Gap Analysis, we will provide recommendations for remediating the security and compliance gaps. The recommendations will be prioritized based on your current state as well as business and technology priorities. Lastly, we will provide customized cybersecurity and compliance policies and assist with the implementation of these policies.
Cybersecurity Expertise
Data Protection, Risk Assessment, Gap Analysis
Cybersecurity Regulation
ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS, SOC 2

What's included $15,000

These options are included with the project scope.

$15,000
  • Delivery Time 70 days
    • Compliance Plan
    • Gap Analysis
    • Implementation
David F.Status: Offline

About David

David F.Status: Offline
Virtual Chief Information Security Officer
Glen Mills, United States - 1:16 pm local time
Specialist in Cybersecurity and Compliance consulting services for Small and Mid-Sized companies. Includes:
- Security Gap Assessment
- Compliance Gap Assessment
- :vCISO
- Security Architecture Review
- SDLC Review
- Technology Stack Review
- 3rd-party Vendor Management
- Pen Testing with 3rd-party Attestation
- Product / toolset review (pre procurement)
- Product / toolset review (Fulfillment)
- Managed Security Service Provider (MSSP)
- Staff Augmentation (Admin to Architect)
- Incident Response Program Development
- Disaster Recovery / Business Continuity
- Business Impact Analysis

Types of Businesses Served:
- Law Firms
- Accounting Firms
- K-12 Schools (Public and Private)
- Higher Education (Community Colleges)
- Local Government (Municipalities, Counties)
- Manufacturers
- Credit Unions and Community banks
- FinTech
- Software Publishers
- Healthcare-related (Surgical,, Assisted Living)
- Biomedical and Biotechnology
- Start-ups

VAR and Managed Service Offerings:
- Microsoft Cloud Service Provider
- Privileged Access Management
- Security Awareness Training Platform
- NDR, EDR, XDR
- OT and IOT
- Data Lifecycle Management
- Incident Response Retainer
- Incident Response - Active Attack
- Incident Response - Forensics

Steps for completing your project

After purchasing the project, send requirements so David can start the project.

Delivery time starts when David receives requirements from you.

David works on your project following the steps below.

Revisions may occur after the delivery date.

Schedule initial Project Planning call and Weekly Project Planning Meeting

Clients purchases the project and provides availability for initial call.

Documentation

Client provides copies of initial documentation related to policies.

Review the work, release payment, and leave feedback to David.