CyberGuide - Information Security and Cyber Risk Management


Roselle Safran, CEO and Co-Founder

600 Pennsylvania Ave SE FRNT 2 #15831
Washington, DC 20003

[email protected]

About KeyCaliber:

Our technology is based on the operational experience of our CEO/Founder who led cybersecurity operations for the Executive Office of the President during the Obama Administration. She saw that the manual approach of conducting interviews and surveys to identify Crown Jewels was antiquated and could not keep up with today’s complex and dynamic environments.

Our approach modernizes the process with a data-driven solution that provides an automated, continuous, real-time view of Crown Jewels. It does not require months of questionnaires and conversations with the right people. Instead it relies on security data that is readily available.

The intelligence provided by KeyCaliber empowers cybersecurity and infrastructure programs with the business context needed to prioritize team efforts, optimize resources, and ensure operational resilience.

Our customers enjoy working with us because we are responsive, innovative, and listen intently to everything they have to say.

Survey Answers

Target Client Size
All company sizes
Does US business in
Northeast, Southeast, Midwest, Southwest, West
Does international business in
Canada, Continental Europe, Asia, South America, Africa, Australia/New Zealand, Mexico, United Kingdom
Primary Service Offering
Cybersecurity software provider
Number of employees
Core cybersecurity offerings
1) Crown Jewels Assessment - KeyCaliber product ingests available security data, runs machine learning algorithms on the data, and produces a report that provides a list of the critical cyber assets ("Crown Jewels"), and a list of the top vulnerabilities associated with the Crown Jewels and the assets that are connected to the Crown Jewels.
2) Real-time Crown Jewels and Resilience Assessments - KeyCaliber automatically and continuously ingests available security data, runs machine learning algorithms on the data, creates an asset inventory, computes a criticality score ("Crown Jewels score") for each asset, visualizes the connections to/from Crown Jewels, provides insights into what to do next to reduce risk, shows gaps in CMDB, and pushes the Crown Jewels scores to vulnerability management, alert/incident management, and change management solutions to prioritize patching, incident response, and asset configuration.