Cybersecurity Services for Growing Companies

From virtual CISO leadership to hands-on security implementation—practical cybersecurity solutions that protect your business without overwhelming your team or budget.

From virtual CISO leadership to hands-on security implementation—practical cybersecurity solutions that protect your business without overwhelming your team or budget.

From virtual CISO leadership to hands-on security implementation—practical cybersecurity solutions that protect your business without overwhelming your team or budget.

Strategic Security Leadership

Executive-level cybersecurity guidance for businesses that need strategic direction without full-time executive costs

Executive-level cybersecurity guidance for businesses that need strategic direction without full-time executive costs

Executive-level cybersecurity guidance for businesses that need strategic direction without full-time executive costs

Most Popular

Virtual CISO Services

Ongoing

Plug-and-play security leadership without the cost or commitment of a full-time hire. Strategic security guidance that takes your company from "no security" to "good security" within 12 months.

What You Get:

✔️ Pragmatic cybersecurity strategy, tailored to your size, sector, and business model

✔️ Framework alignment (NIST CSF 2.0, CIS Controls, or Zero Trust principles)

✔️ Board-ready reporting

✔️ Expert guidance on demand - Strategic decisions on tools, vendors, and risk management

Ideal For:

Growing companies (10 - 500 employees) that need strategic security leadership but aren't ready for a full-time CISO.

Security Program Management

Project-based

Build comprehensive security programs from the ground up that scale with your business and meet compliance requirements.

What You Get:

✔️ Comprehensive program design - Complete cybersecurity strategy aligned with business objectives

✔️ Policy and procedure development - Documentation that people actually follow

✔️ Risk management methodology - Systematic approach to identifying and treating risks

✔️ Metrics and measurement- KPIs that demonstrate program effectiveness

✔️ Governance structure - Clear roles, responsibilities, and decision-making authority

Security Assessments & Reviews

Comprehensive evaluations that give you clear visibility into your security posture and actionable improvement roadmaps.

Comprehensive evaluations that give you clear visibility into your security posture and actionable improvement roadmaps.

Comprehensive evaluations that give you clear visibility into your security posture and actionable improvement roadmaps.

ISO 27001 Gap Assessment & Readiness

ISO 27001 Gap Assessment & Readiness

Compliance

NIST / CIS Control

Systematic evaluation of your current security posture against ISO 27001 requirements with actionable roadmap for certification readiness and improved security management.

What You Get:

✔️ Current state assessment against all 93 ISO 27001:2022 controls and requirements

✔️ Risk assessment methodology review - Evaluation of existing risk management processes and identification of gaps

✔️ ISMS maturity assessment: Analysis of policies, procedures, and governance structures

✔️ Phased approach with effort/impact analysis and realistic timelines

Ideal For:

Companies considering ISO 27001 certification who need clear understanding of current gaps, implementation effort, and business case before committing to full certification project.

Microsoft 365 Security Assessment

Microsoft 365 Security Assessment

Technical Review

Complete security review and hardening of your M365 tenant based on Zero Trust principles and CIS Benchmarks.

What You Get:

✔️ Full tenant security review

✔️ Including Entra ID, Intune and Microsoft 365 applications

✔️ Defender policy check

✔️ Hardening checklist and documentation

✔️ Zero Trust foundation - Architecture aligned with modern security principles

USD 1,000 - USD 3,000

NIS2 Readiness Assessment

NIS2 Readiness Assessment

Compliance

The NIS2 Directive sets strict cybersecurity, governance, and reporting requirements for many organizations across Europe. This assessment helps you understand your obligations, measure your readiness, and build a realistic roadmap to compliance.

What You Get:

✔️ Clear statement if and how NIS2 applies to your business (Essential vs. Important Entity).

✔️ Gap analysis: Mapping of your governance, processes, and security measures against NIS2 requirements.

✔️ Review of processes for detecting, escalating, and reporting incidents within NIS2 timelines.

✔️ Technical controls review (Assessment of core areas)

✔️ Prioritized roadmap – Clear, achievable actions with short-, mid-, and long-term steps.

✔️ Executive reporting – Visual roadmap for management and regulators.

USD 1,000 - USD 3,000

Cybersecurity Assessment

Cybersecurity Assessment

NIST / CIS Control based

Standards-aligned assessment of your security posture based on NIST CSF or CIS Controls, with prioritized roadmap for improvements.

What You Get:

✔️ Gap analysis mapped to industry frameworks

✔️ Prioritized roadmap - What to fix first, second, and third based on impact and effort

✔️ Strategic guidance (Expert recommendations on timing, resources, and approach)

✔️ Executive reporting

✔️ Independent perspective, no vendor bias, just expert advice aligned with your goals

USD 2,500 - USD 4,000

Security Implementation & Transformation

Hands-on implementation of security architectures, frameworks, and technologies that modernize your security posture.

Hands-on implementation of security architectures, frameworks, and technologies that modernize your security posture.

Hands-on implementation of security architectures, frameworks, and technologies that modernize your security posture.

ISO 27001 Implementation & ISMS Development

ISO 27001 Implementation & ISMS Development

Compliance

Build a practical Information Security Management System that achieves ISO 27001 certification while strengthening actual security posture and business resilience.

What You Get:

✔️ Systematic identification and treatment of information security risks

✔️ ISMS framework design - Policies, procedures, and controls integrated with business operations

✔️ Identity-centric security model

✔️ Measurement and monitoring plan: KPIs to track progress and demonstrate value

SOC 2 Compliance Leadership

SOC 2 Compliance Leadership

Compliance

Systematic SOC 2 Type II implementation that removes enterprise sales barriers and builds investor confidence through practical security controls that actually work.

What You Get:

✔️ Current state evaluation against Trust Services Criteria with realistic certification timeline

✔️ Prioritized deployment of security controls that strengthen actual protection, not just compliance

✔️ Complete documentation package that auditors approve and teams can actually follow

✔️ Streamlined audit preparation using your existing tools and systems

Zero Trust Transformation

Zero Trust Transformation

future-proof

Implement Zero Trust principles practically across identities, endpoints, applications, networks, and data using your existing infrastructure.

What You Get:

✔️ Tailored Zero Trust blueprint - Strategy mapped to your specific environment and constraints

✔️ Phased implementation roadmap: Clear priorities for identities, devices, apps and data

✔️ Identity-centric security model

✔️ Measurement and monitoring plan: KPIs to track progress and demonstrate value

Microsoft Defender Setup

Microsoft Defender Setup

Security Stack

A comprehensive Microsoft Defender XDR deployment that creates unified threat detection, automated response capabilities, and 24/7 monitoring.

What You Get:

✔️ Complete Defender XDR configuration across endpoints, email, identity, and cloud apps

✔️ Comprehensive documentation and runbooks

✔️ Security team training on platform management

Tabletop Exercises

Tabletop Exercises

Crisis Prep

Test and improve incident response through realistic cyber incident simulations with your team.

What You Get:

✔️Customized scenario development

✔️ Multi-stakeholder facilitation

✔️ Gap analysis and recommendations

✔️ Enhanced response playbooks

USD 4,000 - USD 6,000

FAQ

FAQ

FAQ

Find answers to common questions about my expertise, services etc…

What services do you provide?

How do I start working with you?

Why hire a freelance cybersecurity consultant?

Do you work remotely or internationally?

How do your contracts and pricing work?

What industries do you work with?

Do you provide incident or ransomware response support?

Can you help secure our Microsoft 365 environment?

What is CISO-as-a-Service / vCISO?

What services do you provide?

How do I start working with you?

Why hire a freelance cybersecurity consultant?

Do you work remotely or internationally?

How do your contracts and pricing work?

What industries do you work with?

Do you provide incident or ransomware response support?

Can you help secure our Microsoft 365 environment?

What is CISO-as-a-Service / vCISO?

What services do you provide?

How do I start working with you?

Why hire a freelance cybersecurity consultant?

Do you work remotely or internationally?

How do your contracts and pricing work?

What industries do you work with?

Do you provide incident or ransomware response support?

Can you help secure our Microsoft 365 environment?

What is CISO-as-a-Service / vCISO?

Available For Work

Curious about what we can do together?
Let’s bring it to life!

hello@yannickhirt.com

All rights reserved, ©2025

Available For Work

Curious about what we can do together?
Let’s bring it to life!

hello@yannickhirt.com

All rights reserved, ©2025

Available For Work

Curious about what we can do together?
Let’s bring it to life!

hello@yannickhirt.com

All rights reserved, ©2025