SOC 2 or ISO 27001 deadline
You signed a contract that requires a passed audit by a specific quarter. You need findings, evidence, and a remediation track that does not slip the audit date.
Most engagements start with one of six situations. If one matches yours, the scoping call is worth booking; we will tell you on the call whether the engagement we suggest fits.
The six common triggers.
You signed a contract that requires a passed audit by a specific quarter. You need findings, evidence, and a remediation track that does not slip the audit date.
Something happened. You need to know what else is exposed, what was missed, and where the next quarter of engineering time should go.
A major feature is about to ship. You want a security signal before customers see it, or before the press release runs.
A buyer asked for a third-party security report. Or you are the buyer and want a clean read on the target before signing.
Your cyber-insurance broker is asking for a recent pentest. Premium discounts often depend on the result.
Your largest deal in the pipeline asked for a security report. Sales is blocked. You need turnaround in weeks, not months.
Less common but worth a call.
What we typically recommend for each trigger.
Penetration testing scoped to the auditor's required surface, plus a gap analysis if controls maturity is unknown.
Recon and credential-exposure review first, then a pentest or red team for the specific concern. Sometimes both.
Pentest of the launch surface, plus a code review of the security-sensitive paths. Tight 3-week engagement.
Pentest of the production app, plus a focused code review and supply-chain audit. Documentation formatted for the buyer or seller.
Pentest scoped to the broker's questionnaire. Attestation letter is the artifact your broker is waiting on.
Fast-turn pentest with a customer-facing summary. The summary is what unblocks the deal; the full report is for your engineers.
When the call is not the right next step.
No code or infrastructure to test yet. Talk to us about an advisory retainer instead; we can review architecture before there is anything to break.
We do not bill for scoping calls, but the call is to scope a paid engagement. If you need general security questions answered, blog posts and open communities are more efficient.
Engagement price reflects scope and depth, not company size. Small-startup engagements still cost what they cost; we just often scope them smaller.
We will not deliver a clean report if the scope has real findings. If you need a stamp regardless of result, this is the wrong firm.
Trigger FAQ.
Two-week kickoff is typical, two-to-three week engagement, one-week report, total six weeks from call to attestation. Faster is possible with notice.
Sometimes, depending on scope. We will say honestly on the call. A poorly-scoped fast engagement is worse than a delayed one.
Yes, on availability. Critical-incident scoping calls are scheduled within 24 hours.
Most engagements still fit one of the six. If yours is genuinely different, the call is even more useful. We have not seen everything but we have seen most things.
Yes. Many clients start with a single pentest and add a retainer, a red team, or quarterly engagements once they see how we work.
30-minute call covers your trigger, scope, and timeline. Free, no NDA.