You will get the Development Team Security Roadmap

Kim C.
Kim C.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Kim, priced and ready to go.

You will get the Development Team Security Roadmap

Kim C.
Kim C.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Kim, priced and ready to go.

Project details

Are security reviews and penetration testing efforts costing too much?
Are you struggling with security defect counts in the products your development teams are producing?
Confused on where to start with introducing security to your development workflow?
Are competitors beating you to market?
Are customers starting to demand higher security and protection of their data.

What if we told you:

We could reduce the amount of spend on traditional security reviews and penetration testing, and at the same time reduce the defects being introduced, significantly improving your security stature, while reducing total project cost?

Together we could help get your product to market quicker, and with fewer security defects, or if your product is already in use, provide the assurity you need that it will withstand the attacks of your adversaries.

We can provide the visibility you need to make good judgement calls on the direction of your products and customer's security.

We can give you the ability to prove to your customers that you are taking their security seriously, which is often a great marketing point as well, and that your products are a much safer investment than your competitor’s?
Cybersecurity Expertise
Configuration Management, Risk Assessment, Cybersecurity Awareness
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, Email System, ERP, PaaS
Cybersecurity Regulation
ISO, NIST Cybersecurity Framework

What's included $2,995

These options are included with the project scope.

$2,995
  • Delivery Time 20 days
    • Small Company Size
    • Medium Company Size
    • Large Company Size
Optional add-ons You can add these on the next page.
Development Security Capability Programme (+ 10 Days)
+$1,500

Frequently asked questions

Kim C.

About Kim

Kim C.
Senior AppSec/Software Engineer | Architect | CTO | 23 years exp
Christchurch, New Zealand - 2:13 pm local time
Technologist / Engineer, Information Security Professional. Retired OWASP NZ Chapter Leader of 8 years. Certified Scrum Master. Facilitator, mentor and motivator of cross-functional, self-managing teams. With a solid 23 years of commercial industry experience across many domains, Kim enjoys teaching others how to apply information security to their Agile processes, bringing the security focus up front where it's the cheapest to implement, increasing profit, and reducing costs. Retired co-founder of the Christchurch Hacker Con, International trainer, speaker, published author, and Retired Software Engineering Radio podcast host. Focusing on:

• Software and network architecture
• Web development and engineering
• Information security

Kim is also a regular blog poster. Kim loves designing and creating robust software and networks, breaking software and networks, then fixing them and helping organisations increase productivity.

Very broad skill set, with many deep specialties. Some of these are:

High level:

• CTO
• Enterprise Application Architecture
• Web Development
• Networking & hardening
• Security
• DevOps

Specific (software technical)

• JavaScript/AJAX
• GoLang
• Node.js
• Python
• C#.NET 2.0-6.0
• HTML5, Jade, HandlebarsJS
• CSS3 & preprocessors
• All the build tools
• ASP.NET MVC 4
• WCF SOAP & REST
• C/C++
• UDP/TCP Networking
• T-SQL, No-SQL

Steps for completing your project

After purchasing the project, send requirements so Kim can start the project.

Delivery time starts when Kim receives requirements from you.

Kim works on your project following the steps below.

Revisions may occur after the delivery date.

Security Roadmap Creation for Your Development Team

Kim will create a roadmap for your Team, providing options to move forward, and addressing known concerns such as low-quality outcomes, high defect counts, slow delivery speeds, low morale, technical debt, and high friction areas.

Security Roadmap Creation for Your Development Team - Outcome 1

Work with the Team to Implement lightweight processes and practices, tools and techniques required to take ownership of their security. As discussed in Kim's book "Holistic Info-Sec for Web Developers".

Review the work, release payment, and leave feedback to Kim.