Now accepting new advisory clients

Security that closes deals, not just audits.

Fractional CISO, privacy, and IT advisory for growth-stage companies. Strategy plus hands-on deployment — getting you investor-ready, enterprise-ready, and IPO-ready with technology that actually does the job.

Frameworks aligned:SOC 2ISO 27001NIST CSFGDPRLaw 25PIPEDAHIPAA
Seed → IPO
Stages supported across the company lifecycle
15+
Years across IT, cybersecurity, and privacy leadership
100%
Engagements include hands-on deployment, not just slides
Multi-framework
SOC 2, ISO 27001, NIST CSF, GDPR, Law 25, PIPEDA
// Services

Strategy, governance, and deployment — under one roof.

We work as a strategic extension of your team — combining executive-level oversight with hands-on engineering. The goal isn't a clean policy binder. It's a security and IT posture that wins enterprise deals, passes investor diligence, and scales to IPO.

Fractional CISO (vCISO)

Executive cybersecurity leadership without the full-time hire. Calibrated to your stage, board, and customers.

  • Security program design, policies, and risk register
  • Board-ready reporting and executive dashboards
  • Incident response planning and tabletop exercises
  • SOC 2, ISO 27001, NIST CSF alignment

Privacy Management Strategy

Build a privacy program that survives audits and unlocks regulated markets — Canada, EU, US.

  • GDPR, PIPEDA, Quebec Law 25, CCPA alignment
  • Data mapping, DPIAs, ROPA, vendor data flows
  • Consent, DSR, and breach response operations
  • DPO advisory and privacy-by-design integration

Investor & Enterprise Readiness

From seed diligence to IPO. Pass enterprise security questionnaires and survive VC technical due diligence.

  • Security due diligence prep for fundraising rounds
  • Enterprise customer questionnaire response engine
  • Pre-IPO controls maturity and SOX readiness
  • M&A and acquirer security pre-readiness

GRC Tool Implementation

We don't just recommend tools — we deploy and operationalize them so they actually generate evidence on day one.

  • Drata, Vanta, OneTrust deployment and tuning
  • Vendor and third-party risk workflows
  • Automated evidence collection and control monitoring
  • Executive readiness dashboards

Identity & Access Management

Zero-trust identity foundations with SSO, MFA, and least-privilege baked into the SDLC.

  • Okta and other IDaaS deployment
  • SSO, MFA, conditional access, role-based access
  • Joiner-mover-leaver automation
  • Privileged access management

Cloud & Endpoint Modernization

Modernize the IT stack while raising the security floor. Hands-on deployment, not slideware.

  • Cloudflare, Zscaler, secure access modernization
  • Jamf, Kandji, Intune endpoint management
  • Cloud migration with security guardrails (AWS / Azure / GCP)
  • Productivity platform rollouts (Google Workspace, M365)
// Methodology

How we work.

A repeatable, outcome-driven engagement model. No frameworks-for-frameworks-sake. Every deliverable maps to revenue, fundraising, or risk reduction.

  1. 01

    Assessment & Gap Analysis

    We baseline your current security posture, IT operations, and privacy exposure against the frameworks and customer expectations that matter for your stage.

  2. 02

    Strategic Roadmap

    A prioritized 90-day to 12-month roadmap calibrated to your investor timelines, enterprise pipeline, and regulatory obligations — with clear owners, costs, and outcomes.

  3. 03

    Implementation & Oversight

    We deploy the tools, write the policies, and operationalize the controls. Hands-on, not handed-off. Your team owns the outcome — we accelerate it.

  4. 04

    Continuous Advisory

    Ongoing fractional leadership, board reporting, vendor reviews, audit support, and incident response — calibrated to your runway and growth.

// About

Built by an operator, not a binder vendor.

Baseline Security is led by a senior IT, cybersecurity, and privacy professional with extensive experience across IT management strategy, privacy management strategy, and cybersecurity management strategy.

The work spans the full company lifecycle — partnering with serious investors and founders to secure tech startups with technology that actually does the job — surviving fundraising rounds, enterprise security reviews, and ultimately public IPO.

Strategy, governance, and tooling all under one roof. No handoffs to a third-party implementer. No 80-page deck without a deployed control. The deliverable is a measurable security and IT posture — not paperwork.

vCISODPO AdvisoryGRCSOC 2ISO 27001GDPRLaw 25PIPEDANIST CSFZero TrustIAMCloud Security

Who we work with

The advisory model is built for organizations that need enterprise-ready operations and security maturity — without carrying full-time executive headcount before they're ready.

  • SaaS companies preparing for enterprise customers
  • Growth-stage startups raising Series A through pre-IPO
  • Companies entering regulated environments (health, fintech, public sector)
  • Remote and hybrid teams scaling securely across borders
  • Organizations modernizing legacy IT and identity stacks
  • Canadian and Quebec-based companies aligning with Law 25 and PIPEDA
Engagement
Fractional or project-based
Retainer, sprint, or milestone-driven.
Geography
Canada · US · EU
Bilingual delivery (EN / FR).
// Contact

Let's talk about your next milestone.

Every engagement starts with a 30-minute discovery call. We'll map your current posture against the milestone you're chasing — first enterprise customer, Series B, audit, IPO — and tell you candidly whether we're a fit.

Email
[email protected]
Geography
Canada · serving North America & EU
Response time
Within 1 business day