Who We Are

Beryllium InfoSec Collaborative is a different type of cyber security company. In our approach, cyber security is not just about information technology.
It is about people too, just like your organization.

NIST Experts

Our team is full of NIST experts. Many security standards map back to NIST, and we strongly believe NIST provides the best security frameworks to strengthen your organization's cyber security program.

Veteran Owned

As a small business owned by veterans, we "serve" to protect your organization from current and future cyber threats, which in turn protects our nation.


We collaborate with the industry's best cyber security experts to provide industry leading solutions for your organization. The days of "we can do it all" are over. We take pride in working with other top security peers and solutions!

Need help with DFARS 252.204-7102 / NIST 800-171 compliance?

CUICK TRAC™ is the cost-effective, fully-compliant solution to all 110 NIST Controls.

How We Help

At Beryllium, we know that information security and cyber security exist to enable business operations, while reducing risk, by operating those systems and processes. Doing cyber security for cyber security sake does not help your organization.


Before you can create an effective information & cyber security plan, you have to identify where your risks are. Our risk assessments provide you with a "dollars & sense" approach to your security program.

learn more

Because all organizations are not the same, we help to navigate and align your organization to the security framework that is right for your business, along with remediation guidance.

learn more

As your virtual chief information security officer, we stand as the security experts who help your business make better decisions, faster, through strategic planning, budgeting and executing.

learn more


Cyber security training is the most cost effective step any company can take to help lower the likelihood of a breach. Human error is your organizations first line of defense, but also your biggest risk.

learn more


Our phishing simulation tool enables any organization to easily conduct authorized attacks to evaluate and re-evaluate employee susceptibility to social engineering tactics. Phishing without any of the danger.

learn more


We help organizations to secure their information systems, while working alongside them to correctly build their network with information security and cyber security in mind.

learn more

What our Customers are saying

"Ben is a Cyber Security expert.  He has that rare ability to be a technical expert and trainer; conducting security presentations in a way that people can understand.  He crafted an impressive security training session for us that provided us with an increased knowledge of current cyber threats and prevention techniques.  It was exactly what we asked for.  I will continue to work with Ben and his Cyber Warriors in the future on Information Security concerns that arise at this firm."

-Don Flower. VP of Information Technology. Twin Cities Middle Market Equity Investment Firm

Latest from the blog

What is the Cybersecurity Maturity Model Certification (CMMC)?

How will the Cybersecurity Maturity Model Certification (CMMC) affect those who do business with the Department of Defense (DoD)? Some questions have been answered, some have yet to be answered, while more questions are still ahead! One thing is for certain: Proof of adequate security is not going away for contractors of the DoD.

Understanding DFARS 252.204-7012 and NIST SP 800-171 Implementation

Looking for a better understanding of DFARS 252.204-7012 and NIST SP 800-171 implementation? Discussions around DFARS compliance, NIST SP 800-171 implementation and cybersecurity within the federal defense contracting space are becoming more and more prevalent by the day.