Based in Switzerland — Serving SMEs & Private Individuals
Cybersecurity Strategy & AI Consulting

Protection Starts With Strategy

Security is not a product you install, it is a living strategy you own. We assess your real exposure, cut through the noise, and build defenses that hold. Every engagement is bespoke. Every strategy is personal. No templates, no guesswork — just clear, honest work from people who actually care.

Custom-Built Solutions

Every engagement is designed around your specific threat landscape. We build what you actually need — not what a brochure says you should have.

// For SMEs
01.01 — S-BUN01
SME Security Foundation Kit
We build your security response foundation from the ground up — tailored to your organisation's specific threat exposure, sector, and operational reality. The deliverable is 10 documents: seven scenario-specific incident response playbooks, an acceptable use policy, a security induction programme, and an offboarding procedure — each written for your company, your team, and the tools you actually use. Not templates you adapt. Documents that already fit.
S-PB01
Incident Response Core Playbook
The foundation of your security response — a structured, step-by-step framework we build around your team, your tools, and your escalation chain. When something goes wrong at 2am, this is the document your people reach for.
  • NIST 800-61 incident lifecycle adapted to your org structure
  • Severity classification & escalation matrix built for your team
  • AI companion prompts tuned to your security stack
S-PB02
Phishing Incident Response Playbook
Phishing accounts for the majority of all breaches. We build your response plan for every variant — from a basic credential-harvesting email to a sophisticated AI-powered BEC attack targeting your leadership. Your team acts fast because the steps are already written for them.
  • All variants: spear phishing, whaling, BEC, smishing, vishing
  • Credential & OAuth containment steps mapped to your platforms
  • Email security configuration (SPF/DKIM/DMARC) for your domain
S-PB03
Ransomware Incident Response Playbook
Ransomware is a timer, not a problem. Every minute of hesitation costs money, data, and reputation. We write your response for the moment the alert fires — so your team knows exactly what to do before panic sets in.
  • Power-off decision framework mapped to your infrastructure
  • Backup validation & 3-2-1-1 strategy adapted to your environment
  • Safe recovery steps referencing your actual systems
S-PB04
Malware & Virus IR Playbook
Malware rarely announces itself clearly. We write your response procedure for the full spectrum — from the obvious virus alert to the threat your team discovers has been present for weeks. When the signs are there, your people know exactly what to do next.
  • Malware type identification guide for rapid classification
  • AV/EDR response checklist aligned to your endpoint tooling
  • Phased containment: isolate, revoke, verify
S-PB05
Data Loss & Stolen Devices Playbook
A laptop left on a train becomes a GDPR crisis in 72 hours — unless your team already knows exactly what to do. We turn that scenario into a manageable process: report, assess, contain, notify the right regulators, move on.
  • Prevention controls mapped to your device fleet and MDM setup
  • 1-hour mandatory reporting & breach scope assessment workflow
  • Regulatory notification steps (GDPR / nDSG / CCPA / PDPA)
S-PB06
Unauthorized Access IR Playbook
Compromised credentials are the most underestimated threat in most SMEs. We build your response for the moment someone realises an account has been taken — with log locations, revocation steps, and investigation workflow mapped specifically to your platforms.
  • MFA deployment as your single most effective immediate control
  • Log locations & attack type identification for your specific platforms
  • Disable first, investigate second — adapted to your access architecture
S-PB07
DoS & DDoS IR Playbook
When your services go down, every minute costs customers, revenue, and trust. We build your containment and escalation procedure around the tools, providers, and contacts specific to your environment — so when an attack hits, your team has a structured response ready instead of improvising under pressure.
  • Traffic baselines documented and provider escalation paths pre-mapped to your setup
  • Response workflow adapted to your available infrastructure and tools
  • Provider contacts & comms templates built for your stakeholders
S-PB08
Acceptable Use Policy
Most employees don't break security policies out of malice — they break them because nobody explained the rules clearly. We write an AUP your people actually understand, covering AI tool usage, remote work, and every grey area — in language that holds up legally and reads like a human wrote it.
  • Five core principles with acceptable & prohibited use examples
  • AI tool usage guidance with data sanitization rules
  • Remote work, social media, and software policies
S-PB09
Cybersecurity Induction Programme
Security awareness starts on day one — or not at all. We write your induction programme in plain language your new hires actually read, framed around the threats relevant to your industry and the tools they will use from Monday morning.
  • Threat landscape framed around your sector and attack surface
  • Password & MFA guidance aligned to your approved tooling
  • AI tool safe-use rules specific to your acceptable use boundaries
S-PB10
Employee Offboarding Procedure
Insider threats don't always come from current employees. We build your offboarding procedure to close every access point — accounts, devices, physical access, shared credentials — with risk-tiered steps that distinguish a standard resignation from a high-risk departure.
  • Risk classification: standard vs. high-risk departures
  • Full revocation checklist mapped to your platforms & physical access
  • NIST, ISO 27001, GDPR, nDSG, CCPA compliance built in
Hourly rates apply
Inquire
01.02 — S-MDR14
AI MDR Linux Box
We design and deploy a self-hosted Managed Detection & Response system inside your environment — sized, configured, and tuned to your infrastructure. Wazuh SIEM, Suricata IDS, and a local AI threat analysis agent running on a hardened Linux appliance we build specifically for your scale. Your security data never leaves your building. No vendor dependency, no cloud subscription, no ongoing cost beyond hardware.
Hardware sizing and appliance build — we assess your infrastructure scale (Micro 1–10, Small 10–30, Medium 50+), configure the right hardware, then harden and deploy it in your environment
Wazuh SIEM and Suricata IDS tuned to your network topology, critical assets, and threat model — not generic defaults. Detection rules calibrated to your normal traffic patterns from day one
Custom AI Threat Agent and SIEM Chatbot configured and tested in your environment — alerts analysed automatically, your operators query in plain English via encrypted Matrix/Element
Anti-hallucination controls — structured JSON output, LLM-as-Judge verification, few-shot escape hatches, context enrichment — so your AI agent is reliable under real incident conditions
Operational handover — daily, weekly, and monthly routines established for your team, alert tier procedures documented, backup strategy implemented. Your team runs it independently after we leave
Data sovereignty & compliance — your security telemetry never leaves your premises. The entire stack is designed to stay fully aligned with GDPR, nDSG, and local data sovereignty requirements — no cloud dependencies, no third-party data processors
Hourly rates apply
Inquire
01.03 — S-PLN11
12-Month Information Security Roadmap
We assess where your organisation actually stands today — your tools, your gaps, your budget, your team capacity — and build a month-by-month execution plan around what you already have. Four phases: core foundations, controls and governance, detection and response, strategic maturity. Delivered as a complete roadmap your team can execute independently, with an AI companion layer and a Year 2 strategic addendum built in.
Current-state assessment — we map your existing tools (M365, Google Workspace, on-prem, hybrid) and identify highest-priority gaps first, so effort goes where it matters most
Month-by-month milestones across four phases and 15 security topic areas, with budget estimates sized to your company band — a master checklist your team can follow without needing us in the room
Technology Translation Guide mapping every security function to the tools you already pay for — no unnecessary vendor recommendations, no surprise costs
Year 2 Strategic Addendum with decision matrices so your security maturity continues independently, long after the engagement ends
AI companion layer configured for your environment — your team queries progress, checks compliance status, and gets context-aware guidance between our sessions, without needing us on call
Hourly rates apply
Inquire
01.04 — S-GUI12
vCISO Project
We install a security leadership function inside your organisation — working with your existing team to embed the thinking, decision-making, and communication patterns of a Chief Information Security Officer. The result: a named person in your organisation who owns security strategy, manages risk, satisfies regulators, and speaks the board's language. This is the capstone that ties your entire security structure together — without the $200K search and salary.
Eight operational pillars mapped to your organisation — Strategy, Risk Management, Policy & Governance, Compliance, Incident Response, SecOps, Vendor Risk, and Security Awareness — with clear ownership assigned to real people in your structure
The perspective shift — we teach your vCISO to think in business risk, not technical severity: how to prioritise, how to justify budget, and how to say no without losing credibility
Board and executive communication — Traffic Light reporting, Three-Option budget framework, and wrong-vs-right presentation approach, adapted to your board's language and expectations
Operational rhythm established for your team — daily, weekly, monthly, quarterly, and annual routines with printable Quick Reference Cards your vCISO will actually use
RACI role distribution scaled to your org chart — governance structures, decision-rights matrices, and compliance coverage (GDPR, nDSG, CCPA, PDPA, NIST CSF, CIS v8) baked into your operating model
Custom templates & checklists — 17+ ready-to-use templates and 21+ operational checklists built around your tools, your terminology, and your reporting chain — so your vCISO has everything they need from day one
Hourly rates apply
Inquire
01.05 — S-MDR15COMING SOON
AI Agent MDR Box
Next-generation AI-assisted Managed Detection & Response. Currently in development — engineered for the threats of tomorrow.
Hourly rates apply
In Development
// For Private Individuals
01.06 — S-ADV16
Full Advisory Packet for Securing your Networking & Digital Footprint
A complete personal security assessment and advisory — your devices, accounts, home network, digital identity, and online presence. We review your specific setup and deliver a written advisory built entirely around your situation: what you have, what is exposed, and exactly how to fix it.
$149 — full packet, no surprises
Inquire
01.07 — S-PER17
Personalized Security Solutions
Hourly consulting for whatever you are facing — a specific concern, an incident, a decision, or an ongoing need. We work through it directly with you, on your terms, with no pre-set agenda and no off-the-shelf answers.
$79–$139 / hour
Inquire

Hourly Consulting

Transparent pricing. No hidden fees. Rates depend on engagement complexity and organisation size.

SMEs by Size
Company SizeRate
$99/hr
$119/hr
$179/hr
Private Individuals
ScopeRate
$79/hr
$109/hr
$139/hr

Meet Lisa & Elisa

Seconsulting is the strategic command. Lisa and Elisa are our specialized field agents — each built for a distinct domain, each with their own universe to explore.

Let's Talk

Every engagement starts with a direct conversation. We take the time to understand your situation, your constraints, and your priorities before proposing anything. Tell us what you are facing — we will respond personally with a clear, honest view of what we can build together.

Start a Conversation →