Resources
Frameworks and templates, free to use.
Small set of working documents we hand to clients. They will be expanded over time. If you want a template not listed here, ask.
SOC 2 founder's guide
Readable walkthrough of Type I vs Type II, scope, evidence, and cost.
Read →Zero Trust for mid-market
NIST 800-207 components ranked by impact for a 50-500 person network.
Read →Why SMBs became the primary target
Attack economics, patterns, and the controls that actually move the needle.
Read →CMMC 2.0 scoping checklist
Level 1 vs Level 2 decision tree, SSP authorship, C3PAO timelines.
Read →AI acceptable use policy baseline
What an AI AUP needs to cover: data classification, vendor clauses, prompt logging, retention.
Read →Cybersecurity cost estimator
Live estimator with published starting prices for every product.
Open →