Services / Risk & Compliance Assessments

Know where you stand
before someone else
finds out for you.

Our assessments give you a current, defensible picture of your security and privacy posture — across frameworks, regulations, and risk domains. Every engagement starts with a free consultation and ends with findings you can act on.

Not sure which assessment fits? That's what the consultation is for.

How We Approach Assessment Work

Assessments that drive action, not documents that don't.

Most risk assessments produce a report that confirms what the client already suspected, recommends things they already know they should do, and sits on a shelf until the next audit cycle forces a repeat of the exercise.

We build assessments around decisions — the budget conversation, the board presentation, the auditor engagement, the insurance renewal, the enterprise deal that's waiting on your security documentation. Every finding is prioritized, every recommendation is specific, and every engagement is structured to transition into ongoing advisory if that's where the work leads.

13

Assessment engagements across security, privacy, and compliance

5-6

Weeks typical engagement timeline from kickoff to final report

Free

Initial consultation to scope your engagement and assess your situation

1

Partner-level advisor on every engagement. No handoffs.

Risk & Compliance

Security posture and
compliance assessments.

For organizations that need a current, defensible picture of their security program — before an audit, a board presentation, an insurance renewal, or an incident makes the gap obvious.

NIST CSF · ISO 27001 · Custom Frameworks

Enterprise Risk Assessment

Comprehensive current-state security posture analysis across people, process, technology, and third-party risk. Control maturity assessment, gap identification, and a prioritized remediation roadmap.

Type I and Type II Preparation

SOC II Audit Readiness

Gap assessment against Trust Services Criteria, control design and implementation guidance, evidence collection process design, and full support from readiness through Type II audit completion.

ISMS Development & Implementation

ISO 27001 Preparation

Information Security Management System design, Annex A control assessment, Statement of Applicability development, and full preparation through Stage 1 and Stage 2 certification body audit.

CIS Controls v8.1 · IG1 · IG2 · IG3

CIS Controls Assessment

Control-by-control assessment against your applicable Implementation Group with attack vector coverage mapping, prioritized remediation roadmap, and cyber insurance documentation support.

CMMC 2.0 · NIST SP 800-171 · C3PAO Prep

CMMC Readiness and Gap Analysis

Level 1 or Level 2 gap analysis, NIST SP 800-171 control implementation review, System Security Plan development, POA&M preparation, and C3PAO assessment preparation.

FedRAMP · StateRAMP · NIST 800-53

FedRAMP & ATO Advisory

Authorization readiness assessment, NIST 800-53 control implementation guidance, SSP development, 3PAO preparation, and continuous monitoring program design for federal and state government authorization.

Industry-Specific Compliance

Regulated industry assessments.

For organizations operating under specific regulatory frameworks where generic security assessments don't satisfy the compliance standard — and where auditors know the difference.

Administrative · Physical · Technical Safeguards

HIPAA Security Rule Assessment

Administrative, physical, and technical safeguards assessment, ePHI inventory and data flow mapping, risk analysis aligned to OCR expectations, BAA review, and safeguards implementation roadmap.

PCI-DSS v4.0 · CDE Scoping · QSA Prep

PCI DSS Gap Assessment

Cardholder Data Environment scoping, twelve requirements gap analysis, compensating controls evaluation, evidence collection guidance, and QSA preparation for merchants and service providers.

GDPR · CCPA / CPRA · U.S. State Laws

Global Privacy Compliance

Multi-jurisdictional privacy law assessment across GDPR, CCPA/CPRA, and U.S. state privacy laws. Data mapping, gap analysis, privacy program design, and the operational infrastructure to stay current as regulations change.

Specialized Advisory Assessments

High-stakes engagements
that require different expertise.

For organizations facing specific decision points — a transaction, a board conversation, a vendor program that isn't working, or a cloud environment that's grown faster than its security controls.

FAIR Methodology · Financial Risk Modeling

Cyber Risk Quantification

FAIR methodology financial modeling of cyber risk exposure. Dollar-denominated loss scenarios for board presentations, budget justifications, and cyber insurance negotiations. Defensible inputs, auditable outputs.

Pre-Acquistion Assessment · Deal Timeline Delivery

M&A Cyber Due Diligence

Pre-acquisition cybersecurity risk assessment built for deal timelines. Security debt quantification, privacy liability estimation, deal term implications, and 100-day post-close integration roadmap.

Vendor Lifecycle · Risk Tiering · Framework Alignment

Third-Party Risk Management

Vendor risk assessment framework design, tiering methodology, questionnaire library development, lifecycle workflow design, and tooling guidance. Built for how vendor risk actually works operationally.

AWS · Azure · GCP · CIS Benchmarks

Cloud Security Posture Assessment

Read-only audit of AWS, Azure, or GCP environments. CIS Benchmark compliance evaluation, misconfiguration detection, IAM analysis, and IaC-ready remediation templates your engineering team can deploy.

How Every Engagement Works

The same process, regardless of which assessment you need.

STEP 01

Free Consultation

We talk through your situation, your drivers, and which assessment fits. You leave the call with a clear scope and honest timeline — no commitment required.

STEP 02

Scoped Engagement

Every assessment is scoped to your actual environment, your compliance requirements, and your timeline — not a fixed package you fit yourself into.

STEP 03

Findings You Can Use

Specific, prioritized, defensible findings. Not a generic report. Every recommendation is actionable within your resource constraints and organizational reality.

STEP 04

Ongoing if You Need It

Assessments transition to continuous compliance advisory, vCISO engagement, or DPO advisory for organizations that need ongoing program support beyond the initial engagement.

Not sure which assessment
you actually need?

Start with the free consultation. We'll map your situation, your compliance obligations, and your timeline against the right engagement — and tell you honestly if something else would serve you better.