Cybersecurity Retainer • Advisory & Expert Support

Why it’s worth working in a retainer model:

The retainer model is a form of long-term cooperation in which your organisation has guaranteed ongoing access to an expert in digital forensics and cybersecurity – without having to commission a new project each time.
It is designed for law firms, companies and institutions that need rapid consultation, incident review or expert report verification without unnecessary delay.


How the retainer model works

A retainer is an agreement that guarantees a defined pool of advisory or technical hours per month.
You gain guaranteed access to expertise and support while keeping costs predictable and ensuring priority service.

The scope may include:


Level 1 Retainer – 15 Cybersecurity Steps (FAR 52.204-21)

The first retainer level covers cybersecurity fundamentals, aligned with
FAR 52.204-21 – Basic Safeguarding of Covered Contractor Information Systems.
It is a set of 15 practical controls that every company – regardless of industry – should implement to provide a basic level of protection for systems and data.

This package is part of the retainer cooperation and allows you to quickly raise your organisation’s security baseline.


15 Basic Safeguarding Steps (Level 1)

  1. Access control for authorised users
    Review of user accounts, removal of inactive accounts, no shared logins.

  2. Least privilege access (“need-to-know”)
    Role- and responsibility-based access assignments.

  3. Control and verification of external devices
    USB policy, restriction or monitoring of removable media.

  4. Secure operation of publicly accessible systems
    Verifying what may be exposed to the Internet – and what absolutely must not.

  5. Identification of users and devices
    Asset inventory and tracking who uses what.

  6. User and device authentication
    Password policy, screen lock, multi-factor authentication (MFA where possible).

  7. Encryption and destruction of media
    Secure disposal of disks, USB drives and phones.

  8. Physical protection of systems and premises
    Controlled access, locked rooms, no unauthorised presence of third parties.

  9. Visitor log and visit control
    Verification of external visitors, supervision and recording of entries.

  10. Securing communications at network boundaries
    Firewalls, traffic filtering, protection against scanning and basic attacks.

  11. Segregation of public and internal systems
    Separation of public-facing servers from the internal corporate network.

  12. System updates and vulnerability remediation
    Patch management, configuration reviews, rapid remediation of critical issues.

  13. Protection against malicious software
    Antivirus/EDR, monitoring of suspicious activity.

  14. Regular updating of protection mechanisms
    Signature updates, automated fixes, keeping controls current.

  15. Scanning systems and verifying external files
    Scheduled scans and real-time scanning of downloaded and opened files.


What the client receives within Level 1 Retainer

This is a fast way for your company to reach a safe operational minimum and align with commonly expected cybersecurity standards.


Level 2 Retainer – Security Maturity (NIST SP 800-171)

The second retainer level is intended for organisations that need
more advanced protection, visibility and control –
for example companies processing customer data, operating critical processes,
manufacturing plants, law firms or institutions with elevated risk.

Level 2 is based on the NIST SP 800-171 framework (CUI), in a simplified,
practical version that can be implemented realistically in SMEs.


Scope of Level 2 – 17 Security Domains (NIST-inspired)

Level 2 focuses on the key elements of 800-171 that significantly increase security:

  1. Advanced access control (AC)
    Roles, privileges, least privilege, delegations.

  2. Security policies & governance (PL)
    Coherent security rules, documented roles and responsibilities.

  3. Systematic incident detection & handling (IR)
    Early alerts, Incident Response Plan (IRP), quick triage and analysis.

  4. Network segmentation & system isolation (SC/CM)
    Security zones, segmentation – especially in IT/OT hybrid environments.

  5. Protection of data at rest and in transit (SC)
    Disk encryption, VPN, TLS, elimination of insecure protocols.

  6. Endpoint security (SI)
    EDR/antivirus, malware blocking, onboarding checks for new devices.

  7. Patch & vulnerability management (RA/CM)
    Patch cycles, vulnerability scanning, prioritised remediation.

  8. Activity & log monitoring (AU)
    Event logging, anomaly analysis, monthly reviews.

  9. Secure system configuration (CM)
    Baselines, hardened configurations, change control.

  10. Media management & backup strategy (MP/CP)
    3-2-1 backup strategy, encryption, recovery tests.

  11. Email security & phishing defence (SC/IA)
    DMARC, SPF, DKIM, advanced filtering and policies.

  12. Privileged account security (AC/IA)
    Admin controls, change tracking, mandatory MFA.

  13. Risk assessment & quarterly reporting (RA)
    Risk identification, criticality assessment, remediation plans.

  14. Vendor & cloud service management (SA/SC)
    Security evaluation of vendors, third-party risk management.

  15. Physical security & third-party access (PE)
    Entry control, monitoring, visitor policies.

  16. BCP/DRP foundations – readiness for disruptions (CP)
    Recovery planning, critical functions, prioritisation of restoration.

  17. Technical training & security awareness (AT)
    Scenario-based exercises, phishing simulations, role-based training.


What the client gains with Level 2 Retainer


Who Level 2 is for


Example cooperation model

  1. Defining scope and monthly hours
    We clarify needs, priorities and communication channels.
  2. Signing a framework retainer agreement
    Guaranteed response times and availability (SLA).
  3. Service delivery and consultations
    Requests handled via a secure communication channel.
  4. Monthly report and recommendations
    Summary of used hours and key findings from consultations.
  5. Continuous development of cooperation
    Option to extend the scope (e.g. trainings, audits, expert opinions).

Typical use cases


FAQ

How is a retainer different from a one-off engagement?In a retainer model you have guaranteed, ongoing access to an expert and a defined number of hours per month, which shortens response times and eliminates formalities for each new request.
How long does a retainer agreement last?Typically from 3 to 12 months, with an option to extend or adjust the scope and hours as cooperation evolves.
Can technical analyses be performed under the retainer?Yes. Within the allocated hours I can perform short analyses, verify reports or expert opinions, prepare technical memos and provide consultations.
Does the retainer agreement include confidentiality?Yes. The agreement includes a full NDA and commitment to protect all information and data provided during cooperation.

Contact

Interested in ongoing cooperation or expert support?

📞 Phone: +48 515 601 621
✉️ Email: biuro@wichran.pl

Schedule a cooperation call »