Optimize vCISO Services

Initial Assessments

Show immediate value to clients and prospects with one-time assessments

Example: Security Consultant starting with a new client wanted to quickly understand the security and risk posture of the client to determine the scope of their long-term engagement. They started with KeyCaliber’s Risk & Resilience assessment to produce a contextualized, prioritized list of risks to address and then developed a risk remediation and mitigation strategy for the highest risks. (See a Sample Report )

Continuous Monitoring

Stay current on security and risk posture as projects progress

Example: Security Consultant’s client was working on a cloud migration project while implementing zero trust policies. Using KeyCaliber’s platform they identified the on-premise assets and their connections before migration, confirmed the cloud assets and their connections post-migration, and prioritized applying zero trust technologies to the critical assets/applications.

Optimize Cyber Resilience and Business Continuity / Disaster Recovery Engagements

Identify Minimum Viable Company (MVC)

Implement a data-driven approach to determine critical assets, business applications, and business processes

Example: Security Consultant client needed to meet regulatory requirements around operational resilience. Using KeyCaliber’s platform, the Security Consultant automatically produced an initial MVC and then consulted with the client to refine the list and associate operational impact estimates and recovery time objectives (RTOs).

BC / DR Planning

Compose plans and roadmaps based on MVC

Example: Security Consultant client needed to update their BC/DR plans in a short time period. The KeyCaliber platform’s identification of critical assets (“Crown Jewels”) and their associated risks enabled the Security Consultant to rapidly assist in the development of updated plans.

CMDB Reconciliation

Ensure an accurate and complete configuration management database

Example: Security Consultant client’s CMDB was severely outdated and the client was struggling to manually add changes. When the KeyCaliber platform was implemented, the client quickly saw all of the assets that were missing from their CMDB and was able to automatically ingest the data for the additional assets discovered by the KeyCaliber platform.

Solutions that Work for You and Your Clients

  • Snapshot Cyber Assessments

    Automated assessments provide a quick and easy way to determine critical assets, understand current risk and security posture, and get actionable insights on how to improve.

  • Continuous Assessments

    Full deployment allows for ongoing analysis to identify when risks arise due to new assets, coverage gaps, vulnerabilities, etc., and tracks how your program is progressing over time.

  • Multi-Tenant Solution

    Each client receives its own tenant for snapshot and continuous assessments, and analytics can be calculated across tenants to provide peer comparisons.

We are proud to be partnered with outstanding cybersecurity service providers.