Who We Are

Beryllium InfoSec Collaborative is a different type of cyber security company. In our approach, cyber security is not just about information technology.
It is about people too, just like your organization.

NIST Experts

Our team is full of NIST experts. Many security standards map back to NIST, and we strongly believe NIST provides the best security frameworks to strengthen your organization's cyber security program.

Veteran Owned

As a veteran owned small business, we "serve" to protect your organization from current and future cyber threats, which in turn protects our nation.


We collaborate with the industry's best cyber security experts to provide industry leading solutions for your organization. The days of "we can do it all" are over. We take pride in working with other top security peers and solutions!

Need help with DFARS 252.204-7102/NIST 800-171 compliance?

CUICK TRAC™ is the cost-effective, fully-compliant solution to all 110 NIST Controls.

How We Help

At Beryllium, we know that information security and cyber security exist to enable business operations, while reducing risk, by operating those systems and processes. Doing cyber security for cyber security sake does not help your organization.


Before you can create an effective information & cyber security plan, you have to identify where your risks are. Our risk assessments provide you with a "dollars & sense" approach to your security program.

learn more

Because all organizations are not the same, we help to navigate and align your organization to the security framework that is right for your business, along with remediation guidance.

learn more

As your virtual chief information security officer, we stand as the security experts who help your business make better decisions, faster, through strategic planning, budgeting and executing.

learn more


Cyber security training is the most cost effective step any company can take to help lower the likelihood of a breach. Human error is your organizations first line of defense, but also your biggest risk.

learn more


Our phishing simulation tool enables any organization to easily conduct authorized attacks to evaluate and re-evaluate employee susceptibility to social engineering tactics. Phishing without any of the danger.

learn more


We help organizations to secure their information systems, while working alongside them to correctly build their network with information security and cyber security in mind.

learn more

What our Customers are saying

"Ben is a Cyber Security expert.  He has that rare ability to be a technical expert and trainer; conducting security presentations in a way that people can understand.  He crafted an impressive security training session for us that provided us with an increased knowledge of current cyber threats and prevention techniques.  It was exactly what we asked for.  I will continue to work with Ben and his Cyber Warriors in the future on Information Security concerns that arise at this firm."

-Don Flower. VP of Information Technology. Twin Cities Middle Market Equity Investment Firm

Latest from the blog

CMMC: What We Hope to See

Contractors working with the Department of Defense, may have heard that the Cybersecurity Maturity Model Certification is coming. As information on the CMMC continues to be released, here is what we hope to see. There is some speculation about what the Cybersecurity Maturity Model Certification is going to look like and what the time-frame will […]

Active Threat: Preparedness is a Way of Life

Being prepared is not a new concept. Preparedness is a way of life. And always has been. Success, for example, often comes from being prepared. When it comes to active threats to our daily lives, preparedness can be the difference between minor and catastrophic.

Navy Gold Coast Recap: CMMC Updates

The National Defense Industrial Association (NDIA) hosted their annual Navy Gold Coast Small Business Procurement Event conference last week in San Diego.