Who We Are

Beryllium InfoSec Collaborative is a different type of cyber security company. In our approach, cyber security is not just about information technology.
It is about people too, just like your organization.

NIST Experts

Our team is full of NIST experts. Many security standards map back to NIST, and we strongly believe NIST provides the best security frameworks to strengthen your organization's cyber security program.

Veteran Owned

As a veteran owned small business, we "serve" to protect your organization from current and future cyber threats, which in turn protects our nation.


We collaborate with the industry's best cyber security experts to provide industry leading solutions for your organization. The days of "we can do it all" are over. We take pride in working with other top security peers and solutions!

Need help with DFARS 252.204-7102/NIST 800-171 compliance?

CUICK TRAC™ is the cost-effective, fully-compliant solution to all 110 NIST Controls.

How We Help

At Beryllium, we know that information security and cyber security exist to enable business operations, while reducing risk, by operating those systems and processes. Doing cyber security for cyber security sake does not help your organization.


Before you can create an effective information & cyber security plan, you have to identify where your risks are. Our risk assessments provide you with a "dollars & sense" approach to your security program.

learn more

Because all organizations are not the same, we help to navigate and align your organization to the security framework that is right for your business, along with remediation guidance.

learn more

As your virtual chief information security officer, we stand as the security experts who help your business make better decisions, faster, through strategic planning, budgeting and executing.

learn more


Cyber security training is the most cost effective step any company can take to help lower the likelihood of a breach. Human error is your organizations first line of defense, but also your biggest risk.

learn more


Our phishing simulation tool enables any organization to easily conduct authorized attacks to evaluate and re-evaluate employee susceptibility to social engineering tactics. Phishing without any of the danger.

learn more


We help organizations to secure their information systems, while working alongside them to correctly build their network with information security and cyber security in mind.

learn more

What our Customers are saying

"Ben is a Cyber Security expert.  He has that rare ability to be a technical expert and trainer; conducting security presentations in a way that people can understand.  He crafted an impressive security training session for us that provided us with an increased knowledge of current cyber threats and prevention techniques.  It was exactly what we asked for.  I will continue to work with Ben and his Cyber Warriors in the future on Information Security concerns that arise at this firm."

-Don Flower. VP of Information Technology. Twin Cities Middle Market Equity Investment Firm

Latest from the blog

Using the CMMC to Your Advantage

Still trying to properly position your organization for the Cybersecurity Maturity Model Certification (CMMC)? Have you considered using the CMMC to your advantage? Here is how.

CMMC 1.0 Overview

CMMC 1.0 is officially here! Roughly seven months after the Cybersecurity Maturity Model Certification was first announced, CMMC 1.0 was announced and reviewed by Department of Defense (DOD) officials and members of the Office of the Under Secretary of Defense, Acquisition and Sustainment (OUSD(A&S)). What does this mean for DOD contractors and suppliers?

CMMC Level 3: Adequate Security or “No-Go”

CMMC Level 3 = Adequate Security. Otherwise, “no-go.” The Department of Defense (DoD) has been requiring adequate security since the release of DFARS 252.204-7012 in the Fall of 2016. Now, the DoD is stepping up its game with the Cybersecurity Maturity Model Certification (CMMC). Why? Because DFARS 252.204-7012 was originally built on trust.