Virginia & Beyond

Security built for the mission‑critical.

ByteTempest delivers managed detection, CMMC compliance, penetration testing, and regulatory consulting to organizations that cannot afford to get security wrong.

118K+DoD contractors requiring CMMC Level 2
$11MAverage healthcare data breach cost
Nov '25CMMC enforcement began
LocalRegional roots, remote-capable nationwide
Who We Serve

One standard.
Every sector.

Defense contractors, healthcare providers, businesses handling payment data, and any organization with a compliance obligation or security need. ByteTempest delivers the same standard across all of them.

Defense & Government

CMMC & DoD Supply Chain Security

CMMC enforcement is active. If you handle CUI and aren't certified, you cannot bid on new DoD contracts. ByteTempest gets you compliant, fast, practical, and audit-ready.

View defense services →
Healthcare & Life Sciences

HIPAA Security & Healthcare Cyber Defense

Small clinics are the top ransomware target in healthcare. We deliver professional-grade security assessments and training, and for qualifying clinics, we do it at no cost through TempestVitals.

View healthcare services →
Core Services

What we deliver.

Managed Detection & Response

Managed Detection & Response

24/7 threat monitoring and response, deployed and managed by ByteTempest. Satisfies CMMC continuous monitoring requirements.

Learn more →
Fractional CISO

vCISO Retainer

Senior security leadership on a monthly retainer. Strategy, board reporting, vendor oversight, and compliance management.

Learn more →
Incident Response

IR Retainer

Pre-paid guaranteed response SLA. Breach detection, containment, eviction, and DFARS/HIPAA reporting support.

Learn more →
Compliance

CMMC Gap Assessment

Full evaluation against all 110 NIST 800-171 controls, SPRS scoring, and a prioritized remediation roadmap.

Learn more →
Security Awareness

SAT Program

Ongoing security awareness training and quarterly phishing simulations, managed entirely by ByteTempest. No internal IT overhead, with full compliance documentation every cycle.

Learn more →
Community

Ways We Give Back

TempestVitals delivers free security to underserved clinics. TempestYouth brings cybersecurity education to K-12 students in Hampton Roads.

Learn more →
TempestShield

CMMC compliance, automated.

TempestShield is our upcoming CMMC SaaS platform, automated evidence collection, live SPRS scoring, and M365 integrations. Join the waitlist for early access.

Services

Find your fit.
Start here.

Select your industry to see the services most relevant to you. Every service links to a full detail page with scope, pricing, and what to expect.

Defense & DIB

CMMC & DoD Supply Chain Security

For defense contractors, subcontractors, and DoD supply chain organizations handling Controlled Unclassified Information. CMMC enforcement is active. If you handle CUI and are not certified, you cannot bid on new DoD contracts.

Managed, Monthly

Managed Detection & Response

24/7 endpoint and server monitoring with active threat response. Satisfies CMMC SI.3.218 and CA.2.157 continuous monitoring requirements and generates monthly evidence for your SSP binder.

View details →
Retainer, Monthly

vCISO Retainer

Senior security leadership on a monthly retainer. CMMC posture management, policy oversight, board reporting, and the security expertise your prime contractors expect to see.

View details →
Retainer, Monthly

Incident Response Retainer

Pre-paid IR with guaranteed SLA. When a breach occurs, you need someone who picks up the phone. Includes DFARS 252.204-7012 reporting support and the 72-hour DoD notification process.

View details →
Managed, Monthly

Security Awareness Training

Managed training and quarterly phishing simulations. Satisfies CMMC AT.2.056 and AT.3.058. Generates the workforce training documentation your C3PAO assessor will ask for.

View details →
Project-Based

Cloud Security Consulting

CUI enclave design in Azure or GCC High, M365 security assessments, Entra ID and Conditional Access review. ByteTempest understands what the Shared Responsibility Model means for CMMC.

View details →
Project-Based

CMMC Project Work

Gap assessment, SSP, CUI enclave design, policy suite, pen testing, SPRS remediation. Each engagement builds toward audit-ready documentation your C3PAO will accept.

Build a quote →
Project serviceDeliverable
CMMC Gap AssessmentGap report + POA&M
System Security Plan (SSP)Audit-ready SSP
CUI Enclave DesignArchitecture + setup guide
Policy & Procedure Suite20+ policy documents
Penetration TestingPentest report, CVSS-rated
SPRS Score RemediationUpdated SPRS + evidence package
CMMC Readiness RetainerMonthly posture reports
Managed Detection & Response

Your network, watched
around the clock.

Every endpoint and server in your environment, monitored continuously by ByteTempest and a 24/7 Security Operations Center. When a threat is detected, we respond. You do not have to.

What's included

ByteTempest deploys and manages endpoint detection across your servers and workstations, handles alert triage, coordinates threat response with a 24/7 SOC, and produces monthly reports formatted for CMMC evidence binders. For healthcare clients, reporting aligns to HIPAA technical safeguard requirements.

For CMMC Level 2 contractors, MDR directly satisfies continuous monitoring requirements under SI.3.218 and CA.2.157, the controls that most small contractors fail to evidence during C3PAO assessments.

Why a managed SOC

Building an internal security operations capability costs $350,000+ annually in staffing alone, and still leaves gaps at night and on weekends. ByteTempest delivers 24/7 SOC-grade detection and active response through enterprise tooling purpose-built for small and mid-size organizations, at a fraction of that cost.

The platform catches persistence mechanisms, lateral movement, and credential theft that traditional antivirus misses, with no dedicated security staff required on your end. Powered by Huntress.

Pricing

Tier 1

First 60 endpoints

$30
/endpoint/month
No minimum, install fee covers onboarding.
  • SOC platform deployment & management
  • Endpoint + server coverage
  • Monthly security report
  • CMMC evidence documentation
  • Email support, 2-day SLA
Growth

61-200 endpoints

$25
/endpoint/month
Growing contractors and multi-provider practices.
  • Everything in Starter
  • M365 Identity protection
  • Priority alert response
  • Quarterly posture review call
  • Phone + email, 4-hour SLA
Enterprise

76+ endpoints

Custom
/month
Multi-site organizations and larger environments.
  • Everything in Growth
  • Dedicated account management
  • Custom SLA negotiation
  • On-site deployment option
  • Board-ready reporting

CMMC bundle discount

Clients on the CMMC Readiness Retainer get 15% off the MDR monthly rate. Add a vCISO retainer and that becomes 20% off.

Fractional CISO

Security leadership
without the full-time cost.

A senior cybersecurity leader on a monthly retainer. Strategic guidance, vendor oversight, board reporting, compliance management: everything a full-time CISO covers, at a fraction of the salary.

Who this is for

Defense contractors who need executive-level guidance on their CMMC program and prime contractor requirements. Healthcare organizations that need security leadership without the salary commitment. Any business where the owner or operations lead is currently the de facto CISO, which is a role they should not own alone.

What a ByteTempest vCISO does

Monthly strategy sessions with leadership. Vendor and tool review. Policy and procedure oversight. Incident response leadership when things go wrong. Board and executive reporting in plain language. Ongoing CMMC posture management for Level 2 clients. Available by phone and email between sessions for urgent questions, not just on the scheduled call.

Pricing

Essentials

Monthly retainer

$3,000
/month
Security leadership for small contractors and clinics.
  • Monthly 90-min strategy session
  • Policy & procedure oversight
  • CMMC posture management
  • Vendor evaluation support
  • Email support between sessions
  • Annual security roadmap
Full vCISO

Monthly retainer

$6,000
/month
Full fractional engagement with board reporting and IR availability.
  • Everything in Essentials
  • Board & executive reporting
  • Incident response leadership
  • Quarterly staff security briefings
  • Phone support, 4-hour response
  • Vendor contract review
  • Risk register maintenance
Enterprise

Monthly retainer

Custom
/month
Multi-site organizations and complex governance requirements.
  • Everything in Full vCISO
  • On-site presence as agreed
  • Multiple location coverage
  • Regulatory filing support
  • Custom SLA

Bundle discount

vCISO clients who also use ByteTempest MDR receive 20% off the MDR monthly rate.

Security Awareness Training

Your people are the perimeter.
Train them like it.

Ongoing security awareness training and quarterly phishing simulations, managed entirely by ByteTempest. No internal IT overhead. Documented compliance evidence every cycle.

Required for CMMC and HIPAA

CMMC Level 2 requires security awareness training under AT.2.056 and AT.3.058. HIPAA requires workforce training under 45 CFR §164.308(a)(5). ByteTempest generates the evidence documentation both frameworks require, automatically, every cycle. Quarterly phishing simulations are included at every tier, so your team stays current and your records stay clean.

Why managed training works

A single annual training session is a compliance checkbox, not a security program. ByteTempest runs your awareness program on a continuous basis: quarterly phishing simulations, automated training assignments, completion tracking, all integrated with the same platform as your endpoint and identity monitoring. One vendor relationship. Powered by Huntress.

Pricing

Baseline

Up to 33 users

$600
/month
  • Enterprise SAT platform
  • Quarterly phishing simulations
  • Automated training assignments
  • Click-rate and completion tracking
  • Monthly compliance reports
  • CMMC / HIPAA evidence formatting
Standard

34-150 users

$18
/user/month
  • Everything in Baseline
  • Role-based training tracks
  • Custom phishing scenarios
  • Quarterly review call
  • New hire onboarding training
Enterprise

100+ users

Custom
/month
  • Everything in Standard
  • Department-level reporting
  • Executive dashboard
  • Custom training content
  • Annual in-person training day
Incident Response Retainer

When it happens, you need
someone who answers.

A pre-paid incident response retainer guarantees ByteTempest is on your team before you need us, not after you've spent three days trying to find someone. Speed is everything in a breach. Retainer clients go to the front of the line.

Why a retainer changes everything

Without a retainer, breach response starts with negotiating scope and price while your systems are compromised and your contracts are at risk. Every hour of that negotiation is an hour an attacker has uncontested access. With a ByteTempest IR retainer, scope is agreed in advance, the relationship is already in place, and we respond the moment you call.

Unused hours and overages

Unused retainer hours roll forward each quarter. You are not paying for hours you do not use. If an incident runs over the included hours, overages bill at the retainer rate. Defense contractors get specific support for DFARS 252.204-7012 reporting, including the contractor portal submission and preservation of images of all compromised systems.

Response tiers

TierResponse SLAHours / QuarterRolloverMonthly
Essential4 business hours4 hrsWithin quarter$1,500
Professional2 hours, any time8 hrsWithin quarter$2,500
Mission-Critical1 hour, 24/7/36516 hrsFull annual rollover$4,000

DoD contractors

DFARS 252.204-7012 requires reporting cyber incidents to DoD within 72 hours. ByteTempest IR retainer clients receive specific support for compliant incident reporting, including the contractor reporting portal submission and preservation of images of all compromised systems.

Cloud Security Consulting

Your CUI doesn't care
if it's on-prem or in Azure.

Organizations of all types are moving workloads to the cloud, and discovering that cloud environments need the same rigorous security posture as on-premise infrastructure, with different controls.

Who this serves

CMMC clients using Microsoft Azure, M365 GCC/GCC High, or AWS GovCloud to store or process CUI. Healthcare organizations migrating EHR systems or clinical data to cloud environments. Any organization needing a clear, documented answer to "is our cloud environment compliant?"

The ByteTempest advantage

Deep familiarity with Azure environments, M365 security controls, Conditional Access policies, Entra ID, and the Shared Responsibility Model as it applies to CMMC and HIPAA. We understand what the cloud provider handles, and what you still own. Most ByteTempest CMMC clients already use M365. Cloud security consulting is the natural next engagement after gap assessment.

Service offerings

ServiceWhat's includedDeliverableInvestment
Azure / M365 Security AssessmentTenant config, Conditional Access audit, Entra ID posture, Defender for Business reviewFindings report + roadmapFrom $6,500
CUI Enclave in AzureCMMC-compliant CUI handling architecture, segmentation, access control, loggingArchitecture doc + implementation guideFrom $8,000
Cloud IR ReadinessLogging config, SIEM integration, cloud-specific IR playbook for Azure and AWSIR playbook + config guideFrom $4,500
FedRAMP Gap AdvisoryGap analysis against FedRAMP Moderate baseline for cloud service alignmentGap report + control roadmapCustom quote

Existing CMMC client discount

Existing CMMC clients receive 10% off all cloud security engagements. Cloud work builds directly on documentation and architecture already completed during your CMMC engagement.

TempestShield, Coming Soon

CMMC compliance
shouldn't require a consultant for every form.

TempestShield automates the evidence collection, gap tracking, and documentation generation that DIB contractors currently do manually, or pay consultants to do for them. Built by practitioners who've run CMMC assessments.

The problem we're solving

The 110 controls in NIST 800-171 require ongoing evidence, screenshots, logs, policy acknowledgments, access reviews, configuration exports. For most small contractors, that evidence lives in a folder on someone's desktop that gets updated the week before an assessment. That approach fails C3PAO assessments.

TempestShield collects that evidence automatically, continuously, and formats it for your SSP binder. ByteTempest consulting clients who use TempestShield enter assessments with organized, complete evidence, and C3PAO assessment prep time drops significantly.

What makes it different

TempestShield is built by the people who run CMMC assessments, not software engineers who read the framework once. The M365 and Azure integrations pull real evidence from your actual environment, not hypothetical templates. The SSP builder generates documentation in the format C3PAOs expect, because we know exactly what they look for.

The live SPRS calculator means you always know your real score, not the optimistic one you wrote in your self-attestation two years ago.

MVP Feature Set

What Phase 1 includes

Core platform
  • Control tracker: All 110 NIST 800-171 controls with status, owner, notes, and evidence attachment.
  • Live SPRS calculator: Real-time score based on current control statuses. Shows delta from prior assessment.
  • POA&M generator: Exports a properly formatted Plan of Action & Milestones from open/partial controls.
  • Evidence locker: Attach files, screenshots, and config exports to individual controls. Version-tracked, timestamped.
  • SSP builder: Guided System Security Plan generation. Outputs a formatted SSP ready for assessor review.
M365 / Azure integrations
  • Entra ID: Pull user list, MFA enrollment, privileged accounts, and Conditional Access policy summaries via Graph API.
  • Defender for Business: Import endpoint protection status, last scan dates, and detected threats as control evidence.
  • Intune: Pull device compliance, encryption state, and patch levels for CM controls.
  • Purview / Compliance Center: DLP policy status, audit log retention, and sensitivity label coverage.
  • SharePoint / OneDrive: Access control reports, external sharing audit, CUI location mapping.
Frontend
React + TypeScript, Tailwind
Backend
Node.js / FastAPI, PostgreSQL
Auth
Microsoft Entra ID SSO
Hosting
Azure (GCC-adjacent)
Pricing
Level 1

Self-assess tier

$299
/month per org
For Level 1 contractors managing self-assessment documentation.
  • 17-control Level 1 tracker
  • SPRS calculator
  • Evidence locker (5GB)
  • Annual affirmation support
  • PDF / XLSX export
Level 2, Standard

Full platform

$799
/month per org
Full 110-control coverage with M365 integrations. The core product.
  • All 110 controls
  • M365 / Azure integrations
  • SSP builder + POA&M generator
  • Evidence locker (25GB)
  • Live SPRS calculator
Level 2, Guided

Platform + consulting

$1,499
/month per org
Platform plus monthly ByteTempest consulting hours for active certification work.
  • Everything in Level 2 Standard
  • 4 hrs/month consulting
  • Monthly posture review call
  • C3PAO prep support
  • Priority support SLA
  • Unlimited evidence storage
Early access

Interested in TempestShield?

Early access clients will shape the feature roadmap and receive founding member pricing, locked for life. Reach out directly to get on the list.

No sales pitch. We will reach out when early access opens.

Ways We Give Back

Hampton Roads gives us our mission.
We give back to Hampton Roads.

ByteTempest runs two community programs rooted in Hampton Roads. TempestVitals serves underserved healthcare clinics. TempestYouth brings cybersecurity education to K-12 students. Both are free. Neither is a marketing exercise.

TempestVitals Pro-Bono Healthcare

Your patients trust you.
We protect that trust.

Free, professional-grade cybersecurity assessments and staff training for underserved healthcare clinics across Hampton Roads. A breach does not just compromise data. It compromises patient care.

Assessment

HIPAA Security Risk Assessment

Structured audit of your technical and administrative safeguards, with a written report, risk ratings, and prioritized recommendations.

Scanning

Network Vulnerability Scan

We scan your clinical network for exposed services, unpatched devices, and unauthorized access points, then deliver a plain-language report.

Testing

Phishing Simulation

Simulated phishing campaign with anonymous click-rate reporting, used only to identify training gaps, never to single out individuals.

Training

Staff Security Awareness Training

60-minute session covering phishing recognition, password hygiene, EHR access discipline, and incident reporting, in plain language.

Policy

Password & Access Policy Review

Audit of your password policies, MFA enrollment, and role-based access controls, with a ready-to-implement policy document written for your EHR system.

Planning

Incident Response Playbook

Custom playbook covering who to call, what to preserve, how to notify patients, and how to comply with HIPAA breach notification rules.

Who qualifies

Independent practices, FQHCs, community health centers, or behavioral health providers in Hampton Roads (Virginia Beach, Norfolk, Newport News, Hampton, Chesapeake, or Portsmouth) with fewer than 50 clinical staff, primarily serving uninsured, Medicaid, or other vulnerable patient populations, with no prior professional security assessment in the past 12 months. Not sure if you qualify? Email us, we'll tell you directly.

TempestYouth K-12 Education

Hampton Roads built the Navy.
Now it builds the next defenders.

Free cybersecurity education for elementary, middle, and high school students, in-person and virtually. Grade-appropriate, career-relevant, and completely free to participating schools.

Grades K–5

Elementary: Strangers, Tricks, and Trust

The threat

Online predators are using apps, games, and social platforms to build trust with children before asking for personal information or photos. Reports of online enticement rose 77% in the first half of 2025 compared to the same period in 2024. These are not strangers in trench coats. They look like other kids, gaming friends, and fans. Children in Hampton Roads military families are specifically targeted through social media posts that reveal deployment schedules, home addresses, and routines.

Every module starts with the real situation, then teaches the skill as the answer. No technical concepts. Storytelling, scenario cards, and group discussion throughout.

  • Strangers online are still strangers. The threat: someone you only know from a screen wants personal information or photos. The skill: understanding that online friends who push for secrets or pictures are using a trick, and what to do when it happens. Group activity: "Would you tell a stranger at the mall?" scenarios mapped to online equivalents.
  • What is personal information, and why does it matter? The threat: sharing where you live, what school you attend, or when your parents are away gives strangers a map to find you. The skill: knowing what is safe to share and what is not. Activity: students sort information into "safe to share" and "keep private" categories.
  • When something feels wrong online, that feeling is right. The threat: predators use pressure, secrecy, and urgency to keep kids from telling adults. The skill: recognizing the feeling when something is not right and knowing that telling a trusted adult is always the correct move. Discussion: who are your trusted adults, and how would you tell them?
  • Passwords are like house keys. The threat: sharing passwords lets people into your accounts the same way sharing a house key lets someone into your home. The skill: creating a password from a sentence, keeping it private, and never sharing it even with friends. Activity: students invent a strong password from a favorite sentence.
  • Some things stay in the family. The threat: social media posts about where a parent works, when they are traveling for work, or what their job involves can be seen by people outside the family. For many Hampton Roads families this matters in a direct way. The skill: understanding that some information about home and family is private, even when it does not feel like a secret. Group discussion: what kinds of things do we keep just for our family? This module is framed around family privacy generally, with a brief age-appropriate note for military families that some work information is especially private.
Grades 6–8

Middle School: Real Attacks, Real Targets, Real Defenses

The threat

82% of K-12 schools experienced a confirmed cyber incident between 2023 and 2024. Social engineering and phishing now exceed technical attacks by 45% in K-12 environments. Financial sextortion targeting teenage boys rose 70% in the first half of 2025. QR codes placed on school flyers and posted in hallways are being used to redirect students to credential-harvesting pages. These are not hypotheticals. Students this age have real accounts, real social media presence, and real exposure.

Threats are named and explained. Students see what real attacks look like and practice identifying them. Group challenges, live demonstrations, and peer discussion throughout.

  • Phishing: the attack that works because it looks real. The threat: a phishing email, text, or DM that looks like it came from a school, a game, or a friend is designed to steal your password or get you to click something. The skill: identifying the markers of a phishing attempt. Live demonstration using a defanged real phishing email. Group challenge: students compete to find every red flag before the timer runs out.
  • QR code scams: the flyer in the hallway might be an attack. The threat: attackers place QR codes in physical spaces, on school bulletin boards, and in legitimate-looking handouts that redirect to credential-harvesting sites. This is actively happening in school environments. The skill: understanding that scanning a QR code is the same as clicking a link, and checking before scanning. Demo: students examine QR codes and predict destinations before scanning.
  • What you send does not stay where you send it. The threat: once a photo or message leaves your device, you have no control over where it goes. Screenshots exist. Disappearing messages do not actually disappear. Content shared with one person gets forwarded to others without consent. This is the foundation of online image-based exploitation: someone has something you sent, and they use it to pressure you. The skill: understanding that digital content is permanent before posting or sending, recognizing when someone is pushing for photos or personal content as a warning sign, and knowing the correct response if it happens: stop responding, do not comply with demands, tell a trusted adult, and report to the NCMEC CyberTipline at cybertipline.org. This module is delivered with age-appropriate language in coordination with school counselors or administrators as requested.
  • Social engineering: hacking people, not computers. The threat: attackers manipulate people using urgency, authority, and trust, not technical tools. Group exercise: students receive a scenario and must identify whether they are being manipulated and how. Discussion of real tactics used against students, parents, and school staff.
  • Your digital footprint: what you post builds a profile, and that profile lasts. The threat: every post, photo, comment, and check-in is a data point. Individually they seem harmless. Together they reveal your location patterns, your relationships, your schedule, and your vulnerabilities. For Hampton Roads students, family posts about military deployments, base access, and job assignments create risks that extend beyond embarrassment. Posts made at 13 have shown up in job background checks at 22. The skill: auditing your own exposure, understanding that social media platforms are permanent record systems regardless of deletion, and thinking about the audience before you post. Exercise: students assess a fictional student's full social media presence, identify what an attacker, a recruiter, and a stranger could each learn from it, and discuss what they would change.
  • Account security: passwords and two-factor authentication. The threat: reused passwords and missing 2FA mean a single compromised account opens the rest. The skill: creating strong, unique passwords and enabling 2FA. Live setup walkthrough. Discussion of what happens after an account takeover.
  • Cybersecurity is a career, and it starts here. Hampton Roads employers in cyber, what the job actually looks like, and how students in this region have a head start. No requirement to be a "tech person." Introduction to CyberPatriot for interested students.
Grades 9–12

High School: Threat Actors, TTPs, and the Field You Can Join

The threat

Education was the third most targeted sector globally in Q2 2024. Between April 2023 and April 2024, ransomware groups including BlackCat/ALPHV and Hunters International hit 217 educational institutions, a 35% increase year over year. Nation-state APT groups from China, North Korea, Iran, and Russia actively targeted education in 2024. Hampton Roads students live and work adjacent to NCIS, NSA CSS, and the largest concentration of defense contractors on the East Coast. Understanding who is attacking, how, and why is not just academic here. It is directly relevant to where many of these students will work.

Specific threat actors, named TTPs, real incidents. Lab-style exercises, real tools on pre-approved demo environments. Aligned to CyberPatriot and CompTIA Security+ pathways.

  • Threat actors: who is actually attacking us and why. Named groups, nation-state vs. criminal motivation, the difference between an APT and opportunistic ransomware. Case study: a real ransomware attack on a school district, what the attackers did step by step, what the school lost, and what could have stopped it. Discussion of why Hampton Roads is a specific high-value target.
  • TTPs and the MITRE ATT&CK framework. How defenders categorize attacker behavior. Students map the school district case study to ATT&CK techniques. Introduction to how SOC analysts use this framework daily. Exercise: given an alert, identify the likely technique and stage of the attack.
  • Image-based exploitation: the operation, the law, and what to do. The threat: financially motivated online exploitation targeting people aged 15 to 24 is one of the fastest-growing cybercrimes in the United States. Organized criminal groups run large-scale campaigns using fake profiles constructed from stolen photos. The pattern is consistent: initial contact on a gaming platform or social media, brief rapport-building, a request to move to a private video or image exchange, and immediate transition to financial demands backed by threats to distribute content to family, coaches, and classmates. Reports targeting teen boys rose 70% in the first half of 2025. The FBI has documented that complying with demands does not end them. Crisis resources and reporting procedures are provided as part of this module, and delivery follows safe messaging guidelines. The skills covered: recognizing the fake profile setup before it reaches the leverage stage; understanding why platforms, images, and contact patterns are the early warning signs; the correct immediate response if targeted (stop contact, do not pay, preserve evidence, report to cybertipline.org and local law enforcement, and tell a trusted adult); and the legal dimension that applies specifically to this age group: distributing intimate images of anyone under 18 is a federal crime, regardless of who sent them first or the age of the person distributing them. Students are not just potential victims in this area. They need to understand their own legal exposure as well. This module is coordinated with school administration in advance and school counselors are notified prior to delivery.
  • OSINT: the two-way street, and why your past posts matter now. Attackers use open-source intelligence to research targets before attacking. So do recruiters. So do background investigators. A photo, a post, a comment from years ago can surface in a security clearance investigation, a hiring decision, or a targeting operation. For students pursuing careers at NCIS, NSA CSS, defense contractors, or military service in Hampton Roads, this is not theoretical. The SF-86 form for a security clearance asks about online activity and associations. Background investigators use the same OSINT tools attackers do. Hands-on exercise: Shodan, DNS lookups, WHOIS, and social media aggregation against a pre-cleared demo target. Students then flip the exercise, building a profile of themselves from public sources only, and assessing what a clearance investigator, an attacker, or a foreign intelligence service could learn. Discussion: what stays online forever, what can realistically be cleaned up, and what the standard is for people pursuing cleared careers in this region.
  • Social engineering at scale: phishing kits, pretexting, and vishing. How professional phishing campaigns are built and deployed. Live examination of a phishing kit structure (sanitized). Pretexting scripts used in real vishing calls against help desks. Students practice identifying and shutting down social engineering attempts in role-play scenarios.
  • Network fundamentals and what attackers see. IP addressing, ports, protocols, and the OSI model taught through the lens of what each layer looks like to an attacker. Wireshark capture demo on pre-approved traffic. Students identify normal vs. suspicious patterns.
  • Introduction to ethical hacking and penetration testing. Reconnaissance, scanning, exploitation, and post-exploitation concepts. Legal and ethical boundaries, written authorization, scope limitations. What a real pentest engagement looks like and what the report delivers. Exercise: students work through a beginner Capture the Flag challenge with guidance.
  • Career pathways: from this classroom to this field. CompTIA Security+ as an entry point. Navy Cyber Warfare Technician (CWT), Air Force 17D, and Army 17C pathways for students considering military service. NCIS, NSA CSS, and civilian defense contractor roles in Hampton Roads specifically. Virginia college programs. CyberPatriot as a direct pipeline. What salaries and growth look like in this field over a 10-year window.

School logistics

In-person or live virtual sessions, 60 to 90 minutes, adaptable to class periods or assembly format. All ByteTempest personnel delivering sessions are background-checked. Modules covering image-based exploitation and online safety are coordinated with school administration and counselors in advance. Request at least 3 weeks ahead. Serving Virginia Beach, Norfolk, Newport News, Hampton, Chesapeake, Portsmouth, and Suffolk. Zero cost to the school, always.

Pricing

Tell us about your org.
We'll build the number.

Enter your organization's size below and every managed service configures itself automatically. Adjust anything you want. Copy the summary and email it to us, we'll respond within two business days.

Quote Builder

Build your custom quote.

Start with your organization's size, every managed service will auto-configure. Adjust any detail, then copy the email summary to send to info@bytetempest.com.

Step 1 Tell us about your organization Services below auto-configure, you can adjust everything
Managed Detection & Response (MDR)
24/7 SOC-backed endpoint monitoring & active threat response
-
Every endpoint and server monitored around the clock by ByteTempest and a 24/7 Security Operations Center. When a threat is detected, we respond. Satisfies CMMC SI.3.218 and CA.2.157 continuous monitoring requirements. Includes deployment, management, monthly evidence reports, and CMMC documentation.
Volume pricing: first 60 endpoints at $30/ep · next 90 at $25/ep · 151+ at $20/ep. No minimum, install fee covers onboarding.
Identity Threat Detection & Response (ITDR)
Continuous M365 identity monitoring & account compromise defense
-
Continuous monitoring of your Microsoft 365 environment covering email-based attacks, OAuth abuse, unauthorized app consent, and account compromise. The most common initial access vector for DIB contractors. All licensed M365 identities monitored continuously, with managed response when threats are confirmed.
Volume pricing: first 60 identities at $30/identity · next 90 at $25 · 151+ at $20. No minimum, install fee covers onboarding.
Security Awareness Training (SAT)
Managed security awareness training · quarterly phishing simulations included
-
Automated security awareness training and quarterly phishing simulations, managed entirely by ByteTempest. Training assignments, click-rate tracking, completion reporting, and compliance documentation included. Satisfies CMMC AT.2.056 and HIPAA 45 CFR §164.308(a)(5). Zero internal IT overhead.
$18/user/mo. No minimum. Includes quarterly phishing simulations at all tiers.
Virtual CISO (vCISO) Retainer
Fractional security leadership, configure your deliverables
-
Senior cybersecurity leadership on a monthly retainer, without the full-time cost. Select the deliverables you need. Pricing scales with scope. Every engagement includes a monthly strategy session and access to your vCISO by phone and email between sessions.
Base retainer $3,000/mo covers strategy session + email/phone access. Add deliverables above to build your engagement.
Incident Response Retainer
Pre-paid IR with guaranteed SLA, configure your coverage
-
Pre-paid incident response puts ByteTempest on your team before you need us. Retainer clients go to the front of the line. Unused hours roll forward quarterly. If an incident exceeds retainer hours, overages bill at the retainer rate.
Base rate depends on SLA + hours selected. Unused hours roll forward within the quarter.
CMMC Readiness Retainer
Ongoing compliance management, configure your deliverables
-
CMMC is not a one-time event. The readiness retainer keeps your posture current between C3PAO assessments, managing your POA&M, updating documentation as your environment changes, and keeping your SPRS score accurate. Select the deliverables you need.
Base retainer $2,500/mo covers POA&M management + monthly status report.
CMMC Project Work
Gap assessment, SSP, pen test, policy suite & more
-
One-time project work covering the full CMMC readiness lifecycle: initial gap assessment, documentation, architecture, and testing. All deliverables are formatted for C3PAO assessment.
Compliance Services
HIPAA · PCI DSS · NIST CSF · Virginia CDPA, project & retainer
-
ByteTempest provides compliance consulting for healthcare, payment card, and data privacy frameworks, preparing your organization for audits and ongoing regulatory obligations. Note: ByteTempest is not a QSA (PCI) or C3PAO (CMMC). We prepare you for third-party assessments but do not conduct the formal certification audits.
HIPAA, Health Insurance Portability & Accountability Act
PCI DSS, Payment Card Industry Data Security Standard
NIST CSF, Cybersecurity Framework
Virginia CDPA, Consumer Data Protection Act
Compliance Maintenance Retainer
Cloud Security Consulting
Azure, M365 GCC/GCC High, AWS GovCloud, project-based
-
Cloud security assessments and architecture for any organization moving workloads to the cloud. Deep familiarity with Azure, M365 security controls, Conditional Access, Entra ID, and the Shared Responsibility Model as it applies to CMMC, HIPAA, and PCI DSS.
TempestShield, CMMC Compliance Platform
Automated evidence collection, live SPRS scoring, M365 integrations
Coming soon

TempestShield is in development. The platform will automate CMMC evidence collection, maintain a live SPRS score, generate SSPs and POA&Ms, and integrate directly with your Microsoft 365 and Azure environment via Graph API. Early access clients receive founding member pricing locked for life.

Your estimate
Select services on the left to build your estimate.
Monthly recurring
-
One-time fees
-

Send to info@bytetempest.com, 2 business day response.
Why no form? No tracking?

About ByteTempest

Practical security.
No overhead.

ByteTempest is a cybersecurity firm built for organizations that cannot afford to get security wrong. Defense contractors, healthcare providers, businesses handling payment data, regulated industries. Headquartered in Hampton Roads, serving clients in Virginia and remotely nationwide.

Our approach

1

Practical over theoretical

We deliver what you can actually implement, not frameworks that gather dust. Every recommendation comes with a realistic path to execution.

2

Transparent pricing

Starting rates are posted publicly. No surprise invoices, no scope creep without a conversation first, and no enterprise packages dressed up for small businesses.

3

Community-invested

TempestVitals and TempestYouth are our commitment to Hampton Roads: pro-bono security and education for the organizations that need it most.

4

No upsells, no lock-in

We will tell you when you are ready for an assessment. We will not manufacture ongoing dependency or recommend tools that do not serve your situation.

Who we serve

Defense contractors & DIB suppliers

CMMC readiness, continuous monitoring, and supply chain security for organizations in the DoD industrial base across Hampton Roads.

Healthcare providers

HIPAA compliance, security risk assessments, and clinical network protection for practices, FQHCs, and health tech companies.

Businesses & regulated industries

PCI DSS, NIST CSF, Virginia CDPA, and managed security services for any organization with a compliance obligation or security need.

Hampton Roads & beyond

Headquartered in Hampton Roads with deep local roots, serving clients across Virginia and remotely nationwide.

Contact

No form. No tracking.
Just an email.

When you reach out to ByteTempest, your message goes to a person, not a CRM. Nothing is logged, tracked, or stored on our end until we choose to reply. For a firm in the business of protecting data, that is the only honest way to do it.

Defense & Commercial

info@bytetempest.com

CMMC compliance, penetration testing, commercial HIPAA assessments, MDR, vCISO, and general inquiries.

Email template, commercial inquiry
Subject: Inquiry - [CMMC / Pen Test / MDR / vCISO / Healthcare] Hi ByteTempest, Name: [Your full name] Organization: [Company name] Role: [Your title] What I need help with: [Brief description, e.g. "We are a 15-person defense subcontractor in Virginia Beach handling CUI and need CMMC Level 2 readiness."] Current situation: [e.g. SPRS score, existing controls, timeline pressure, etc.] Best way to reach me: [Phone or email, and preferred times] Thank you, [Your name]
Our approach

No form.
No tracking. Just email.

A short explanation of why ByteTempest collects your information the way it does.

Why we do not use a contact form.

Most contact forms on security company websites are built on third-party platforms that log your submission, store your data in a CRM, track your behavior across sessions, and use that data for retargeting. Some of it is sold. Some of it leaks.

ByteTempest is in the business of protecting sensitive information. Running a form that pipes your name, company, and security concerns into a third-party database felt inconsistent with that. So we do not do it.

When you copy the quote summary and email it to info@bytetempest.com, your message goes directly to a person. Nothing is logged, tracked, or stored anywhere except our inbox. We do not run analytics on inbound email. We do not sell contact lists. We respond within two business days.

What the quote builder collects

The quote builder runs entirely in your browser. The sliders, service selections, and contact fields you fill out are never transmitted anywhere while you are configuring. Nothing leaves your device until you click Copy and paste it into your own email client. At that point, you control what you send and to whom.

What this site does not do

This site does not use Google Analytics, Meta Pixel, HubSpot tracking, session recording tools, or any third-party analytics platform. There are no cookies beyond what is required for the site to function. There is no retargeting. There is no ad network integration.

What we do with your email

If you email us, we read it and respond. We do not add you to a mailing list, share your information with partners, or follow up beyond the scope of what you reached out about. If an engagement does not move forward, your contact information is not retained for marketing purposes.