Skip to main content

Let's talk

Tell us what you need and we’ll align on scope, constraints, and next steps.

Book a scoping call

By submitting, you agree to be contacted about your request. No spam. Your information will not be sold or released.

check_circle
Thanks — we’ll reach out soon.
We’ll follow up within 1–2 business days. If you want to schedule sooner, reply to the confirmation email with a few time windows and we’ll send an invite.

What happens next

  • check_circleWe review your request within 1–2 business days
  • check_circleWe schedule a 30‑minute scoping call
  • check_circleWe align on scope, constraints, and desired artifacts
  • check_circleWe outline a clear next step and timeline

Confidentiality & handling

We treat all submissions as confidential. We do not share your information with third parties. If you require an NDA before detailed discussions, tell us in your message and we will accommodate.

Not ready to talk yet?

Review artifacts and examples first.

Sample cyber risk assessment report

See the output format and decision artifacts.

View a sample report →

CORA Dashboard

See the cyber risk assessment dashboard and product details.

Explore CORA →

Product lineup

See current tools and controlled access options.

See products →

Frequently asked questions

How fast will you reply?

Usually within 1–2 business days.

Do I need to prepare anything for the call?

No — just a rough sense of your mission, constraints, and urgency.

Is the scoping call paid?

No. The scoping call is a short conversation to determine fit and next steps.

Do you support restricted environments?

Yes. We routinely support air‑gapped and constrained environments.

What if I’m not sure which service I need?

Tell us your constraints and goals. We’ll recommend the right starting point.