Cyber Commandos hero

More Services and Knowledge Sharing

Find the perfect cybersecurity solution for your business.
Or explore our knowledge sharing articles.

Ad-hoc Services

Govern
Cybersecurity Strategy
Strategy Icon

Cybersecurity Strategy - Develop/ Review

Understand business strategy and vision to create/ refine SMART (Specific, Measurable, Achievable, Relevant, and Time-bound) IT goals specific to your business needs.
Pricing: Base price: ₹ 75,000 | Package cost: ₹ 1,00,000 / for both

vCISO Icon

Virtual CISO (vCISO) Advisory Services

Provide experienced cybersecurity leadership on specific strategy, budgeting decisions, governance, and risk management initiatives.
Pricing: Base price: ₹ 25,000 / project | Package cost: ₹ 1,00,000 / month

CISOaaS Icon

CISO-as-a-Service (CISOaaS)

Provide strategic guidance and expertise on budgeting, cybersecurity implementation, and ongoing management.
Pricing: Base price: ₹ 5,000 / hour | Package cost: ₹ 1,00,000 / month

Policies, Standards, and Procedures
Policies Icon

Information Security Policies - Develop/ Review

Draft/ Review & update cybersecurity policies specific to your business needs based on industry best practices.
Pricing: Base price: ₹ 2,000 / policy | Package cost: ₹ 25,000 / 20 policies

Documentation Icon

Information Security Standards & Procedures Documentation

Develop cybersecurity standards and operational procedures to implement policies across technical domains.
Pricing: Base price: ₹ 25,000 / domain | Package cost: ₹ 1,00,000 / 5 domains

Gap Analysis Icon

Policy-to-Controls Mapping/ Gap Analysis

Map policies to cybersecurity control domains (our framework/ frameworks like ISO 27001, etc.) and report gaps.
Pricing: Base price: ₹ 2,000 / policy | Package cost: ₹ 25,000 / 20 policies

Risk & Control Management
Risk Framework Icon

Risk Management Framework - Design/ Review

Design or review an IT risk management framework specific to your business needs - i.e., risk appetite, risk & impact areas, methodologies, tools, and processes for risk identification, assessment, and treatment.
Pricing: Base price: ₹ 2,00,000

Risk Register Icon

IT Risk Register - Design/ Review

Create/ review a centralized repository of identified IT risks, their assessment, mitigation strategies, associated controls, and residual risk levels.
Pricing: Base price: ₹ 2,00,000

RACI Icon

RACI Matrix - Develop/ Review

Understand your organizational structure and define responsibilities for cybersecurity functions & processes.
Pricing: Base price: ₹ 6,000 / function | Package cost: ₹ 25,000 / 5 functions

Legal & Regulatory Compliance
Compliance Icon

Compliance Gap Assessment

Identify security gaps against data privacy frameworks/ regulations such as ISO 27001, DPDP Act, BFSI, IRDAI, GDPR, PCI-DSS, HIPAA, etc.
Pricing: Base price: ₹ 2,00,000

Contract Review Icon

Third-Party Contract Review

Advise on information security clauses in contracts with vendors/ third-parties to ensure adequate protection and compliance requirements are met.
Pricing: Base price: ₹ 25,000 / contract | Package cost: ₹ 1,00,000 / 5 contracts

Implement
Control Implementation
Implementation Icon

Process & Controls - Implementation/ Advisory

Advise on implementing IT controls to business processes.
Pricing: Base price: ₹ 25,000 / domain | Package cost: ₹ 1,00,000 / 5 domains

Control Automation/ Application Advisory
Automation Icon

Process & Controls - Automation/ Application Support

Assist in selecting, implementing, and optimizing tools and platforms to automate controls & business processes, including leveraging Artificial Intelligence (AI).
Pricing: Base price: ₹ 20,000 / domain | Package cost: ₹ 85,000 / 5 domains

Measure
Key Performance Indicators (KPIs) & Key Risk Indicators (KRIs)
KPI/KRI Icon

Cybersecurity KPIs & KRIs - Develop/ Review

Establish/ Review metrics to measure performance of organizational processes against defined objectives & SLAs.
Pricing: Base price: ₹ 6,000 / report | Package cost: ₹ 25,000 / 5 reports

Reporting & Dashboards
Dashboards Icon

Reports & Dashboards - Develop/ Review

Establish/ Review dashboards (using tools like Power BI/ Tableau/ etc.) to visualize the overall performance of organizational processes against defined objectives.
Pricing: Base price: ₹ 6,000 / report | Package cost: ₹ 25,000 / 5 reports

Maturity Model Assessment
Maturity Icon

Cybersecurity Maturity Assessment

Evaluate process maturity against chosen framework/ model to identify current maturity level, strengths, weaknesses, and a roadmap towards target maturity level.
Pricing: Base price: ₹ 6,000 / process | Package cost: ₹ 25,000 / 5 process

Benchmarking
Benchmarking Icon

Industry Benchmarking Assessment

Assess cybersecurity capabilities and report gaps in - controls, processes, and technology - compared to peer organizations & best practices.
Pricing: Base price: ₹ 1,00,000

Train
Security Culture Assessment
Culture Icon

Conduct Culture Survey

Engage employees with interview, behavioural surveys, & questionnaires to identify awareness and cultural gaps in cyberseccurity protection efforts. Develop a roadmap to address gaps.
Pricing: Base price: ₹ 50,000

Security Awareness & Training Strategy
Training Icon

Cybersecurity Training

Design a security awareness program and conduct training on any information security topic to foster a security-first mindset among employees.
Pricing: Base price: ₹ 25,000 / day | Package cost: ₹ 1,00,000 / 5 days

Workshops Icon

Facilitate Risk and Control Self-Assessment (RCSA) Workshops

Facilitate and guide teams in performing Risk & Control Self-Assessment exercises where process owners document the risks, controls, and issues associated with their business processes.
Pricing: Base price: ₹ 25,000 / process | Package cost: ₹ 1,00,000 / 5 processes

Phishing Icon

Phishing Simulation & Social Engineering Testing

Conduct simulated phishing campaigns and social engineering tests to assess employee's awareness & susceptibility. Additionally, provide training to re-enforce vigilance.
Pricing: Base price: ₹ 1,00,000

Role-Based Training Icon

Role-Based Security Training

Conduct customized security training for specific roles and responsibilities within the organization - like executives, developers, IT support, etc.
Pricing: Base price: ₹ 25,000 / process | Package cost: ₹ 1,00,000 / 5 processes

Test
Three Lines of Defense
3LOD Icon

3LOD Framework - Advise/ Review

Guide/ Review the implementation and maturity of first, second, third lines of defense for cybersecurity governance and risk management.
Pricing: Base price: ₹ 1,00,000

External Audits & Certifications
Audits Icon

ISO 27001/ SOC 2 - Readiness Review/ Support

Review readiness before/ Provide support during compliance audits for ISO 27001/ SOC/ external audits/ etc.
Pricing: Base price: ₹ 2,00,000

Penetration Testing & Red Teaming
Pentesting Icon

Penetration Testing/ Red teaming Exercise

Simulate real-world attacks to assess your organization's defenses.
Pricing: Base price: ₹ 5,00,000

Purple Team Icon

Purple Team Assessment

Facilitate exercises between offensive (red) and defensive (blue) teams to improve threat detection and response capabilities.
Pricing: Base price: ₹ 5,00,000

Audit/ Independent Assessment
Audit Icon

Cybersecurity Audit/ Assessment

Perform an independent assessment of cybersecurity policies, processes, and controls to report on gaps in protection efforts and recommend corrective action plans.
Pricing: Base price: ₹ 30,000 / domain | Package cost: ₹ 1,25,000 / 5 domains

Our Domain Expertise

Proven by security lifestyle and risk management practices by our partners

Identity & Access Management (IAM)

Secure your digital identities and control access to your critical resources with our robust IAM solutions.

IT Asset & Configuration Management

Gain full visibility and control over your IT assets and configurations to eliminate vulnerabilities.

IT Risk Management

Proactively identify, assess, and mitigate IT risks to protect your business continuity and reputation.

Data Protection & Endpoint Security

Safeguard sensitive data and secure every endpoint, from laptops to mobile devices, against threats.

Cloud, Email & Web Security

Defend your cloud environments, email communications, and web applications from sophisticated attacks.

Network & Cryptography Management

Build an impenetrable network foundation with advanced security controls and cryptographic protocols.

Change & Release Management

Ensure that all changes and new releases are secure and compliant with your security policies.

Vulnerability & Patch Management

Stay ahead of attackers by continuously scanning for vulnerabilities and applying timely patches.

System Acquisition & Software Development Lifecycle (SDLC)

Integrate security and privacy from the ground up, ensuring every new system and application is built with security in mind.

Incident Response Management

React swiftly and effectively to security incidents with our expert incident response team.

Artificial intelligence (AI) & Autonomous Tech Management

Manage the risks associated with AI and autonomous technologies, ensuring they operate securely.

Backup & Disaster Recovery

Prepare for the worst with comprehensive backup, disaster recovery, and business continuity plans.

Physical & Environmental Security

Secure your physical infrastructure and environments to prevent unauthorized access and data loss.

Third-Party Risk Management (TPRM)

Minimize the risks posed by your vendors and third-party partners to maintain a secure supply chain.

Data Governance & Data Privacy

Navigate the complex landscape of data governance and privacy regulations with confidence.