New York, NY  ·  Cybersecurity & Risk Consulting

Cybersecurity &
AI risk assessments
that lead to action.

We help organizations across healthcare, finance, legal, technology, nonprofit, retail, and professional services identify cyber and AI exposure, harden Microsoft 365 and cloud environments, prepare compliance evidence, and turn findings into action.

cyberspace — assessment_scan.sh
$ run-assessment --target org --full
[ Initializing vulnerability scan... ]
[ Inventorying M365 and AI tooling... ]
[ Loading NIST AI RMF risk modules... ]
Identity & Access Controls:
✓ SSO configuration ........... PASS
✗ MFA enforcement ............ FAIL
✗ Admin role review .......... FAIL
⚠ Guest access policy ........ PARTIAL
Cloud & Endpoint Exposure:
✗ External sharing ........... CRITICAL
✗ AI data handling ........... CRITICAL
⚠ Audit log retention ........ 90 days
✓ TLS 1.2+ in transit ........ PASS
Result: 3 CRITICAL · 6 HIGH · 8 MODERATE
$
Frameworks
NIST CSF NIST AI RMF OWASP LLM Top 10 NIST SP 800-30 CIS Controls ISO 27001 HIPAA SOC 2 PCI-DSS CMMC
Who We Help

Security and AI risk support for regulated, growing, and resource-constrained teams.

Different industries face different triggers: cyber insurance, vendor questionnaires, AI adoption, customer audits, Microsoft 365 drift, or a recent incident. The assessment should match the business pressure.

01

Healthcare

HIPAA risk analysis, vendor BAAs, Microsoft 365 controls, patient data exposure, and AI acceptable use for clinical and business workflows.

02

Financial Services

Vendor due diligence, access controls, audit evidence, cloud configuration, incident readiness, and defensible reporting for leadership.

03

Legal & Professional Services

Client data protection, secure collaboration, phishing risk, AI usage policy, document handling, and cyber insurance readiness.

04

SaaS & Technology

SOC 2 readiness, LLM and application security review, cloud architecture, customer questionnaires, and vendor security evidence.

05

Nonprofits & Education

Practical security roadmaps, Microsoft 365 hardening, staff training, AI usage boundaries, and incident response planning.

06

Retail & Small Business

PCI-DSS alignment, endpoint exposure, ransomware preparation, email security, vendor risk, and realistic remediation priorities.

Capabilities

Detailed security and AI services behind each engagement.

Use these as building blocks. We scope the right mix based on your industry, current risk, deadlines, and the evidence your stakeholders need.

AI Risk Assessment

Review how your organization uses generative AI, embedded AI features, copilots, vendors, and internal models. We identify data leakage, privacy, security, legal, operational, and governance risks.

NIST AI RMFAI InventoryData ExposureRisk Register
AI Governance & Acceptable Use

Practical policies for employees, executives, developers, and vendors using AI tools. We define approved use cases, prohibited data, review workflows, accountability, and monitoring requirements.

AI PolicyData RulesVendor ReviewTraining
AI Application / LLM Security Review

Security review for AI-enabled products and workflows, including prompt injection, sensitive data exposure, unsafe outputs, model access, logging, and third-party API integration risks.

OWASP LLMPrompt InjectionAPI RiskData Leakage
Vulnerability Assessment

Authenticated internal and external vulnerability scans of your network, servers, workstations, and internet-facing systems. Findings ranked by exploitability and business impact with a clear remediation plan.

NessusNmapCVE MappingRemediation Plan
Microsoft 365 Assessment

Deep review of your M365 tenant — Entra ID, Exchange Online, Teams, SharePoint, OneDrive, Defender, and Purview. We identify misconfigurations, overpermissioned users, and compliance gaps.

Entra IDConditional AccessDefenderMFA Audit
Security Risk Assessment

Comprehensive evaluation of your security posture using NIST SP 800-30. We identify threats, quantify risk, and deliver a prioritized corrective action plan your leadership can act on immediately.

NIST 800-30Risk RegisterGap AnalysisCAP
Penetration Testing

Simulated adversary attacks against your network, applications, or social engineering defenses. We go beyond automated scanning — manual exploitation to find what scanners miss.

Network PentestWeb AppSocial EngineeringRed Team
Policy & Procedure Development

Custom security policies written for your organization and industry — not boilerplate. Covers acceptable use, incident response, access control, data retention, sanctions, and more.

AUPIncident ResponseData RetentionAccess Control
Security Architecture Review

Evaluation of your network design, segmentation, firewall rules, remote access infrastructure, and cloud architecture against security best practices and your specific threat model.

Network DesignFirewall ReviewZero TrustZTNA
Incident Response Planning

Build your incident response program before you need it — IR plan development, tabletop exercises, breach notification procedures, and staff training to minimize damage when the worst happens.

IR PlanTabletop ExerciseBreach NotificationRunbooks
Third-Party & Vendor Risk

Assess the security posture of your vendors and supply chain. We review contracts, questionnaires, SOC 2 reports, and access controls — so your partners don't become your weakest link.

Vendor QuestionnaireSOC 2 ReviewContract ReviewBAA Audit
vCISO / Fractional Security Leadership

Expert security leadership on retainer — strategy, program oversight, board reporting, and compliance management without the cost of a full-time CISO. Available monthly or quarterly.

Monthly RetainerBoard ReportingComplianceProgram Oversight
Common Triggers

Reasons clients call us.

Most teams do not start with a blank roadmap. They start with a deadline, a customer request, a new AI rollout, or a concern that no one owns clearly.

01

Cyber insurance renewal requires better evidence.

Underwriters ask for MFA, endpoint, backup, logging, and incident response proof.

02

A customer or vendor sent a security questionnaire.

You need accurate answers, supporting evidence, and a plan for gaps.

03

Leadership wants visibility into AI usage.

Employees, vendors, copilots, and SaaS tools may already be using sensitive data.

04

Microsoft 365 settings have grown messy over time.

Identity, sharing, audit logs, retention, and mail security need a practical baseline.

05

A compliance or board deadline is approaching.

Risk needs to be documented clearly enough for leadership, auditors, and insurers.

06

A recent incident exposed ownership gaps.

You need response planning, tabletop practice, and remediation priorities.

AI Risk & Governance

Govern AI usage before it becomes unmanaged risk.

Employees, vendors, copilots, SaaS tools, and internal applications can expose sensitive data long before a formal AI program exists. We identify where AI is already in use, what data is at risk, which controls are missing, and what policies are needed before usage scales.

AI Tool & Vendor Inventory

Document approved and unapproved AI tools, business owners, data access, vendor terms, and contractual risk.

Sensitive Data Exposure Review

Identify where client data, PHI, financial records, source code, credentials, or confidential documents may enter AI systems.

Acceptable Use Policy

Define approved use cases, prohibited data, human review requirements, training expectations, and escalation paths.

Copilot & SaaS AI Configuration

Review identity, permissions, sharing, retention, audit logs, and data boundaries for Microsoft 365 and SaaS AI features.

LLM Application Security Review

Assess prompt injection, unsafe output, model access, plugin/API exposure, logging, and retrieval data controls using OWASP LLM Top 10.

NIST AI RMF Mapping

Map AI risks to govern, map, measure, and manage activities with practical remediation owners and due dates.

Request an AI Risk Review
What You Get

Executive-ready security work, not scanner output.

Each engagement is designed to leave your team with evidence, decisions, and next steps: what is exposed, why it matters, who owns the fix, and what can wait.

Executive-ready reports Control mapping Risk register Remediation roadmap AI policy package Board-ready readout
01

Executive Risk Summary

A concise business-level readout of risk themes, likely impact, insurance/compliance relevance, and the decisions leadership needs to make.

02

Technical Findings With Evidence

Reproducible evidence, affected assets, severity, exploitability, screenshots where useful, compensating controls, and remediation guidance.

03

Policy & Evidence Package

Security and AI governance documentation that can support audits, insurance reviews, vendor due diligence, board updates, and customer questionnaires.

04

Prioritized Remediation Roadmap

A working plan with owner, severity, likelihood, impact, due date, and recommended implementation order.

Compliance Readiness

Framework-aligned security —
for regulated and growing teams.

Whether you are preparing for cyber insurance, vendor due diligence, SOC 2, HIPAA, PCI-DSS, CMMC, AI governance, or internal risk management, our assessments connect technical risk to the evidence your stakeholders expect.

01

Security Risk Analysis

A structured review of threats, vulnerabilities, AI usage, business impact, and existing safeguards. We produce a defensible risk register and corrective action plan that maps to the frameworks relevant to your organization.

02

Policy Library Development

Custom security and AI policies covering acceptable use, incident response, access control, vendor management, device handling, data retention, workforce training, and approved AI tooling. Written for your actual operating environment.

03

Vendor & Third-Party Risk

We review critical vendors, questionnaires, contracts, SOC reports, data access, and security obligations so partner risk does not become an unmanaged exposure.

04

Microsoft 365 & Cloud Alignment

Most organizations run on Microsoft 365 and cloud services, but defaults are rarely enough. We review identity, MFA, audit logging, data loss prevention, sharing, retention, and secure collaboration settings.

Framework Coverage
NIST AI RMFGovern, Map, Measure, Manage AI RiskCore
OWASP LLMLLM Application Security RisksCore
NIST CSFIdentify, Protect, Detect, Respond, RecoverCore
CISImplementation Groups & SafeguardsCore
SOC 2Security, Availability, ConfidentialityMapped
HIPAAAdministrative, Physical, Technical SafeguardsMapped
PCI-DSSCardholder Data Security ControlsMapped
CMMCControlled Unclassified Information ReadinessMapped
ISO 27001Information Security Management ControlsMapped
M365Identity, Email, Collaboration, Audit LoggingCore
How We Work

Structured. Transparent. Delivered on time.

Every engagement follows a proven process built for minimal disruption to your operations and maximum clarity on findings.

1
Week 1
Kickoff & Discovery

Stakeholder interviews, document review, scope confirmation, credential and access setup

2
Week 1–2
Technical Review

Vulnerability scans, M365 assessment, AI usage review, network architecture review, physical walkthroughs

3
Week 2–3
Analysis & Findings

Gap mapping, risk rating every finding, corrective action plan development

4
Week 3–4
Report Delivery

Full assessment report, risk register, and executive summary delivered for review

5
Week 4–6
Readout & Roadmap

Executive presentation, remediation roadmap walkthrough, and implementation planning

Why Cyberspace

Practical security work that stays connected to business decisions.

We are not a platform and not a scanner with a PDF output. We help your team understand risk, document evidence, and move remediation forward.

NY

New York-based, nationwide support

Available for local engagements across the New York metro area and remote advisory work for organizations nationwide.

01

Framework-aligned without checkbox thinking

Assessments map to NIST CSF, NIST AI RMF, CIS Controls, SOC 2, HIPAA, PCI-DSS, ISO 27001, and CMMC where relevant.

02

Executive-ready deliverables

Reports are written for leadership, boards, insurers, auditors, and vendor due diligence, not only technical readers.

03

Remediation support after findings

Findings are prioritized into action so owners, timelines, dependencies, and business impact are clear.

Get Started

Know your risk
before your adversary does.

Tell us what triggered the conversation: insurance, compliance, AI adoption, a customer request, Microsoft 365 concerns, or a recent incident. We will help identify the right first step.

solutions@cyberspace-llc.com www.cyberspace-llc.com

New York, NY  ·  Serving clients nationwide

What Happens Next

  1. We reply within one business day.
  2. We schedule a 30-minute discovery call.
  3. We identify your highest-priority cyber, compliance, or AI governance need.
  4. You receive a recommended scope, timeline, and next step.

This secure form sends your request to solutions@cyberspace-llc.com. You can also email directly using the button on the left.

Request received.

Thanks for reaching out to Cyberspace LLC. Your request has been sent to solutions@cyberspace-llc.com. We will review the details and respond within one business day.

If your request is urgent or incident-related, email us directly so it can be triaged faster.

Email Directly