Security Consulting

Security work that
actually gets implemented.

Practical security grounded in what changes behavior — not what looks good in a report. Assessments, identity hardening, and policies your team will actually follow.

Start a conversation

You're probably a fit if…

Security problems tend to surface in one of a few predictable ways. If any of these sound familiar, it's worth a conversation.

Nobody actually owns security

Your IT is handled by an MSP or a generalist. Conditional Access, admin account hygiene, MFA enforcement — nobody's looked at these deliberately. That's normal. It's also fixable.

You just had an incident

A phishing hit, a compromised account, a ransomware near-miss. Something happened and now it's time to close the gaps — before you have to explain it to clients or regulators.

You're facing compliance pressure

Cyber insurance renewal requirements tightened, a client sent a security questionnaire, or a vendor is asking about your posture. You need documentation and actual controls — not just a policy PDF.

Your M365 is still on default settings

The defaults aren't secure. Conditional Access, MFA enforcement, admin role separation, and legacy authentication — these require deliberate configuration that most MSPs skip.

What's included in a security engagement.

Scope is confirmed during a discovery call. Engagements can focus on a specific area or cover the full posture review.

Not included

  • 24/7 SOC or managed detection & response
  • Penetration testing or red team exercises
  • Compliance certification (SOC 2, ISO 27001, HIPAA)
  • Ongoing security monitoring

Ongoing security posture oversight — quarterly reviews, tracking against baseline, vendor accountability — that's part of the Fractional IT Director retainer.

How a security engagement works.

Most security assessments produce a long list. This one produces a short, prioritized list — and then we work through it.

01

Assessment

Review of your environment: identity management, MFA posture, admin practices, email security configuration, endpoint state, and backup and recovery. I look at what's actually configured, not what the policy says.

02

Gap analysis & prioritization

Findings sorted by risk and effort — not alphabetically, not by severity score alone. You get the 5–10 things that actually matter right now, not a 200-item laundry list that nobody acts on.

03

Remediation

I work through priority items with you or alongside your MSP. Writing the Conditional Access policies, configuring the settings, closing the gaps — not just documenting them.

04

Documentation & baseline

Security policies, admin procedures, and a security baseline you can measure against going forward. The engagement closes with something your team can actually use, not just a PDF to file away.

The first conversation costs nothing.

Tell me where you are and what prompted the question. I'll tell you honestly whether it's a problem worth addressing right now — and what addressing it actually looks like.

Start a conversation