Video can’t be displayed
This video is not available.
Our Products and Services
Your Complete Cybersecurity Solution
Establishing Cyber Resiliency and Implementing a Cybersecurity Strategy Aligned with Your Organization’s Priorities to Help You Spend Smarter!
Education and Consultation go hand in hand to ensure your internal team can sustain and maintain your infrastructure's security posture long-term. Cybersecurity is not just about managing risk, it’s also a strategic issue that shapes product capability, organizational effectiveness, and customer relationships. However, many businesses find it challenging to conduct the kind of transformation that embeds security considerations into all business products and processes while maintaining the pace of innovation.
We bring the full power of our firm, leveraging both industry and functional expertise, to help clients define a comprehensive cyber strategy (covering risk, business, and cultural dimensions), “de-risk” their digitization efforts and establish a secure enterprise. We leverage our partnerships with industry-leading cybersecurity technology providers, proprietary assessments, in-depth training exercises, and organizational transformation efforts to address our client’s most pressing cybersecurity issues, whether that’s securing a major cloud transformation, protecting operational technology, establishing appropriate cyber capabilities, or managing the implications of a public crisis which includes ransomware attack strategies and response.
We know your business, which is why we are uniquely positioned to find the right strategy, convene leadership around a common goal, communicate a clear plan to boards and stakeholders, and set up the organization to be prepared for the challenges of tomorrow. Our experts conduct cyber and business risk gap analysis for schools, universities, government, and commercial organizations which includes risk mitigation and sustainment planning, penetration testing and application security services, audit preparation, policy and procedure development, and process automation. and tailored education instruction, and facilitation for individuals and organizations on how to implement, monitor and maintain cyber hygiene best practices for SOHO, BYOD, SMBs, the Startup ecosystem, large multi-site enterprises, and government entities.
We bring the full power of our firm, leveraging both industry and functional expertise, to help clients define a comprehensive cyber strategy (covering risk, business, and cultural dimensions), “de-risk” their digitization efforts and establish a secure enterprise. We leverage our partnerships with industry-leading cybersecurity technology providers, proprietary assessments, in-depth training exercises, and organizational transformation efforts to address our client’s most pressing cybersecurity issues, whether that’s securing a major cloud transformation, protecting operational technology, establishing appropriate cyber capabilities, or managing the implications of a public crisis which includes ransomware attack strategies and response.
We know your business, which is why we are uniquely positioned to find the right strategy, convene leadership around a common goal, communicate a clear plan to boards and stakeholders, and set up the organization to be prepared for the challenges of tomorrow. Our experts conduct cyber and business risk gap analysis for schools, universities, government, and commercial organizations which includes risk mitigation and sustainment planning, penetration testing and application security services, audit preparation, policy and procedure development, and process automation. and tailored education instruction, and facilitation for individuals and organizations on how to implement, monitor and maintain cyber hygiene best practices for SOHO, BYOD, SMBs, the Startup ecosystem, large multi-site enterprises, and government entities.
Assessing Risk and Resilience
Our holistic, risk-based approach to cybersecurity bases the transformation on the client’s existing capabilities and provides the current risk information and reporting that executives need to prioritize threats and devise effective controls. By identifying where the business creates value and analyzing threats, our experts help design necessary cyber programs, determine the allocation of funds, and inform board discussions on cyber risk strategy.
Fractional CISO and CTO
We also cater to Startup Entrepreneurs that want to learn how to build secure applications and maintain governance, risk, and compliance objectives for their businesses. Ask us about our fractional CISO and CTO as a Service Options for businesses large and small.
Security Strategies in Digital Transformation
We leverage our deep understanding of the technology landscape to help companies implement security strategies and establish digital resilience. We work to de-risk enterprise platforms, extract value from existing investments, secure value chains, and embed “security by design” into new products and businesses.
Establishing Crisis Response and Preparedness
We help organizations minimize the business impact of cyberattacks by enabling faster and more coordinated responses, improving regulatory and public perception, and building the capabilities of senior executives. We work with clients to diagnose their preparedness, engage leadership in crisis response training, and create a crisis playbook and “nerve center” that establishes governance and responsibilities.
Building Long-Term Cyber Capabilities
We work with clients to transform the culture and embed cyber capabilities into every aspect of the business. Our team of experts helps redesign operating models, adopt agile approaches, set up attribute-driven assessments, and attract and retain the right talent.
Inspiring Business Confidence through Meeting Dynamic Cybersecurity Governance, Risk, and Compliance
The digital revolution has changed the way businesses operate and enterprises today need to be highly dynamic and adaptive to change to be competitive. With the change, however, comes new risks.
At Chrysallis.AI, we help you counter these risks effectively through our Dynamic Cybersecurity model. Chrysallis.AI Cybersecurity Services help organizations rethink, reimagine, and re-engineer enterprise security for a dynamic business.
We help organizations understand, identify and implement a framework of governance and continual assessment to enable an adaptive and evolving posture while leveraging cost-effective technologies. The focus on four key pillars which include people, process, technology, and culture allows us to stay on top of changing cyber threats. This provides our customers with a better chance to be proactively prepared to detect/identify and minimize losses, in case of a potential cyber-attack. Our experts are your experts and can help you prepare for CMMC, ISO 27001/20K, 9001, NIST RMF, COBIT, SOX, FedRAMP, A-123, and PCI-DSS audits through a comprehensive gap analysis which includes education of your staff and risk mitigation and sustainment strategies.
At Chrysallis.AI, we help you counter these risks effectively through our Dynamic Cybersecurity model. Chrysallis.AI Cybersecurity Services help organizations rethink, reimagine, and re-engineer enterprise security for a dynamic business.
We help organizations understand, identify and implement a framework of governance and continual assessment to enable an adaptive and evolving posture while leveraging cost-effective technologies. The focus on four key pillars which include people, process, technology, and culture allows us to stay on top of changing cyber threats. This provides our customers with a better chance to be proactively prepared to detect/identify and minimize losses, in case of a potential cyber-attack. Our experts are your experts and can help you prepare for CMMC, ISO 27001/20K, 9001, NIST RMF, COBIT, SOX, FedRAMP, A-123, and PCI-DSS audits through a comprehensive gap analysis which includes education of your staff and risk mitigation and sustainment strategies.
Education and Consultation to Government and Federal Contractors
We also offer tailored curriculum and training for government and federal contractors for ISSOs and includes the entire RMF processes, System Security Plan development, Controls Selection, How to write Proper Implementation Statements, Data Categorization, Privacy Impact Analysis, Business Impact Analysis, COOP Planning, IR Planning and everything else you need to develop a winning ATO package which includes a custom Continuous monitoring Strategy for your organization that meets compliance objectives. Our staff are experts with a background in both ISSO work and IV&V and know NIST RMF, ISO, and CMMC. We are also familiar with CSAM, Xacta, ComplyVision, and eMASS. Chrysallis.AI is adept in helping organizations save money by identifying redundancies, automating processes and workflows, and maximizing efficiencies in service delivery that affects internal and external stakeholders. This includes supply chain risk management and contract reviews of SLAs, OLAs, Cloud Service Provider Contracts, and other vendor agreements to help cut costs and holds suppliers and vendors accountable. We will also help develop policies and procedures. Our team will help you identify areas of risk and areas of continuous quality improvement, identify key progress indicators that help management measure the effectiveness of people, processes, technology, technical, operational, and management controls in your organizations, and turn your cyber and business risk dashboards from red to green.
Cybersecurity Career Advisory and On-Going Mentorship and Guidance
Students and Interns get an all-access pass to career mentorship and advisory services to put them on the right path to job success. Cyber Security has a large swath of potential career paths which may be overwhelming for students when trying to choose which cyber position to pursue. We help students align their goals and objectives to ensure they have the right knowledge, skills, and abilities in order to achieve success in their choices and their future outcomes.
CyberSec Internship Hands-on On-the-Job Training Program
The cybersecurity internship is designed to provide exposure to a variety of security tasks that one should expect a junior or entry-level security analyst to perform. In addition to career consultation for graduates of our cybersecurity internship OJT program, we also afford our interns the ability to shadow our senior staff and support our customers and our hiring partners to gain on-the-job training as part of our internship and apprenticeship programs. All interns receive an all access pass to career mentorship and guidance which includes the following as part of the program.
- Interview Preparation
We help our students develop interview preparation skills through mock interview sessions and help our students with what may have been perceived by the interviewer as a negative answer into learning how to translate it into a positive response.
- Resume Assistance
We assist our students in the resume writing process and provide tailored individualized guidance and advice on how to highlight the best qualifications of that job seeker to stand out among the pack in order to improve their chances of success in getting an interview.
- Job Placement Assistance
We align our students with the right fit for employers and make connections in support of job placement. Ask us about our apprenticeship and internship programs within Chrysallis.AI and those of our hiring partners.
Speaking Engagements and Webinars
We also facilitate micro-learning sessions at the K-12 level to train our youth on how to implement proper data protection safeguards and encourage and empower the next generation to enter the field of cyber security and technology. Book us or our interns and students for speaking engagements, webinars, podcasts, and cyber/tech panels.
Products: Metaversity Learning Management System
We have an advanced scenario-based learning platform with gamification and VR to train the cybersecurity workforce of the future. Our Metaversity ed-tech platform offers an emulated real-world "digital twinning" of systems, networks, cloud, IoT, and ICS architecture in a live gaming environment powered by AI/ML.
Includes an all-access pass to career mentorship, advisory, and job placement services for participants of our student and internship programs.
- Entry-level/Beginner, Intermediate/Mid-level, Advanced/Senior-level
- CISO/CIO Leadership/Executive-level
- Individuals or groups, micro-learning courses, or extended learn-as-you-go programs with access to live instructors
- Adult-Upskilling, and Employee Reskilling
Piranha.ai - SOHO IoT Voice and Data Intrusion Prevention Application
You can also sign up on our waiting list here for our Small Office Home Office IoT Voice and Data Intrusion Prevention Application, Piranha.ai (Coming Soon).
YOUR INVESTMENT
PRICING MENU
(Recommend viewing this pricing menu on your desktop/laptop)
Full package or a la carte menu options
TASK/DELIVERABLE Startups/SMBs Medium/Large (Single Site) Large Enterprise (Multi-Site)
Deliverable A: Detailed Gap Analysis
(Includes report of findings and recommendations) Starts at $5,000 Starts at $10,000 Starts at $30,000
Deliverable B: Remediation & Sustainment
Strategy $1,500 $3000 $5000
Deliverable C: Modified or Draft Policies
and Procedures (full set) $3,000 $7,000 $10,000
Deliverable D: Purple Team Exercise
(Includes report of findings and recommendations) Starts at $3,500 Starts at $7,500 Starts at $11,200
Deliverable E: Red Team (Pen Test) x1 ea.
(Includes report of findings and recommendations) Starts at $1,750 Starts at $3,000 Starts at $5,000
Deliverable F: ITIL Training and Service Delivery
Catalog Development $1,450 $2,500 $2,500
Deliverable G: One-on-one or team coaching
of executives (per session) $250+ $250+ $250+
Ask us about our group rates
Deliverable H: CMMC Audit Preparation
(Includes Detailed Gap Analysis & training of your team) Starts at $5,000 Starts at $10,000 Starts at $30,000
Deliverable I: ISO 27001/20K/9001 Audit Preparation
(Includes Detailed Gap Analysis & training of your team) Starts at $5,000 Starts at $10,000 Starts at $30,000
Deliverable J: NIST RMF Audit/Assessment Preparation
(Includes Detailed Gap Analysis & training of your team) Starts at $5,000 Starts at $10,000 Starts at $30,000
Deliverable K: Tailored ISSO, ISSM, ISSE ATO Package
Prep Role-based Training
(SSPs, PIAs, Network Diagrams, POAM management et al)
per session $3,500 $3,500 $3500
Deliverable L: ISSO as a Service (per hour) $150 $150 $150
Deliverable M: CISO as a Service (per hour) $250 $250 $250
Deliverable N: Threat Intelligence for C-Suite
Reputation Analysis and Protection
(per year subscription per executive) $10,000 $25,000 $50,000
{Ask us about our group rate}
Deliverable O: SOC as a Service
(includes BYOD management of users and devices
Linux, MacOS, Windows, IOS, Android) $35 per user per month for SMBs and large organizations
Full Package Discount Totals ~$34,950 ~$66,750 ~$157,450
In addition to the above deliverables, pricing for other services is outlined in the following pricing table:
Description Price
Metaversity LMS is in beta
We are accepting beta users and presales.
Monthly/Annual subscription license model (per seat/per user) $49 per month per seat per user or per course options
Piranha.ai (Coming Soon)
Small Office Home Office IoT Voice and Data Intrusion Prevention
We are accepting beta users and presales. $99 per month (single user) or $199 per month (multi-user) [housemates/roommates]
Speaking Engagements $5000 per engagement + logistics (large venues)
$500 + logistics (small venues)
Initial Consultation (15-30 mins) FREE
A deposit of 10% is required to start work. All pricing is fully negotiable. We also accept payment plans and can provide a monthly service subscription model if that works best for the organization we are supporting. We are here to serve you and appreciate your business!
TERMS
Pricing is based on the complexity and scope of work (e.g., multi-site, small, medium, or large business, number of endpoints, number of users et al). We tailor our approach and pricing to meet your needs and your budget.
NEXT STEPS
To discuss your needs further, please contact us today:
Book a free no-obligation 15 min intro/discovery call: https://calendly.com/chrysallisai/intro-call-1
Thank you for supporting a woman and service-disabled veteran-owned business! We look forward to serving you and your team!
Best, Anna London, Founder & CEO