Strengthening Your Security From Day One

At IncrementOne, we understand that effective cyber security isn't a one-time fix—it's a journey. Our approach guides you through each critical stage, from initial awareness to comprehensive security integration.

Your Cyber Security Journey

1
Create Buy-in and Understanding
Path Forward™ Expert Roundtable
Security Preparedness Simulation
2
Assess Your Risk Profile
Risk Management Assessment
Selecting a Framework
3
Select the Right Controls
Data Security
Identity and Access Management (IAM)
Incident Response Planning
4
Grow Cyber Security Awareness
Cyber Security 101 Training
Cyber Awareness for Leadership

Our Approach:
Shift-Left Security Integration

In today's rapidly evolving digital landscape, waiting until the end of development to address security concerns is no longer viable. At IncrementOne, we champion shift-left security integration—embedding cyber security practices from the earliest stages of your software development lifecycle.

Why Shift Security Left?

Traditional security approaches often treat security as a final checkpoint, leading to:
  • Costly last-minute changes
  • Project delays
  • Increased vulnerability windows
  • Technical debt accumulation
By integrating security earlier:
  • Vulnerabilities are caught before they become entrenched
  • Development teams build security expertise naturally
  • Costs decrease significantly
  • Products reach market faster and more securely

Our Unique Expertise

What sets IncrementOne apart is our deep expertise in both organizational change management and developer workflows. We understand that effective security integration requires more than technical knowledge—it demands cultural shifts and process refinements that work with your teams, not against them.

We specialize in:
Adapting security practices to fit agile methodologies
Empowering developers with security knowledge
Creating sustainable security practices that scale
Building bridges between security and development teams

Our Services Tailored to Your Journey

Create Buy-in and Understanding

Path Forward™ Expert Roundtable

Perfect for organizations at the beginning of their security transformation, our Path Forward™ Expert Roundtable provides:
  • Strategic guidance from experienced security executives
  • Prioritized roadmapping tailored to your organization's specific needs
  • Regular check-ins to ensure progress and address challenges
  • A clear understanding of your cyber security direction
Ideal for: Organizations seeking clarity on their security direction and initial steps.

Security Preparedness Simulation

Test your organization's readiness with our tabletop exercises:
  • Realistic scenarios tailored to your industry and threat landscape
  • Facilitated discussion to identify potential operational impacts to drive awareness and urgency in your incident response
  • Documentation of findings and improvement recommendations
  • Team-building experience that builds security awareness
Graphic of 4 tags of 4 different features: expert guidance, strategic roadmapping, prioritized action plans and regular checkups

Assess Your Risk Profile

Risk Management Assessment

Our comprehensive assessment offers organizations valuable insights:
  • Evaluation of your current governance, risk, and compliance posture
  • Identification of security gaps and vulnerabilities
  • Alignment to a cyber security framework to enable future maturity benchmarking
  • Prioritized recommendations based on risk level
  • Benchmark comparisons against industry standards and best practices

Selecting a Framework

After learning about your organization and situational needs we help by:
  • Selecting a cyber security framework suitable for your context
  • Prioritizing recommendations informed by the framework based on risk level
  • Benchmarking comparisons of different frameworks
Ideal for: Small to medium organizations needing to understand their current security position and next steps.
Graphic of assessments files

Select the Right Controls

Prioritize Security Controls

Based on your Risk Management Assessment, we look to leverage your existing controls and prioritize any additional controls. We can also help recommend an approach to implementing essential controls like:
  • Data Security - Protecting your most valuable information assets
  • Identity and Access Management (IAM) - Ensuring the right people have the right access
  • Incident Response Planning - Developing procedures to respond effectively to security events
  • Threat Detection and Response - Implementing monitoring and alerting systems
Ideal for: Organizations that require a comprehensive evaluation of their current governance, risk, and compliance profile with prioritized recommendations.
Graphic with a switch of security control

Grow Cyber Security Awareness

Cyber Security 101 for Teams 

Our foundational training programs are tailored to the audience and build essential security awareness through:
  • Practical threat modeling exercises relevant to your business
  • Hands-on workshops that reinforce security concepts
  • Real-world scenarios that demonstrate security principles
  • Customized content for technical and non-technical team members

Cyber Awareness for Leadership 

Our professionals offer tailored awareness programs for board or council that build essential security awareness through:
  • Cyber security fundamentals through the lens of the executive team
  • Hands-on workshops that reinforce security concepts
  • Real-world scenarios that demonstrate security principles
Ideal for: Teams looking to build a common security language and baseline understanding that is applicable from senior leaders right through to seasonal part-time staff.
Graphic of a shield with arrows pointing to 4 check marks

Meet the Experts Behind Our Security Solutions

Profile picture of Peter Buckley
Peter Buckley
CISO - Head of Cyber Security
Bio:

Peter is a senior cyber security leader with 17 years of experience in information security and 25 years overall in technology and risk. He has led cyber programs, including the successful, incident-free integration of the largest Canadian bank merger, and is known for aligning cyber risk management with business goals across diverse industries.

Profile picture of Geordie Cree
Geordie Cree
President of Cree Cybersecurity
Bio:

Geordie is a seasoned IT and information security professional with over 30 years of experience, including 25+ years in the Credit Union system across key senior roles. He specializes in assessing risk, developing security programs, and delivering practical, business-aligned solutions tailored to each organization's unique needs.

Profile picture of Husam Fezzani
Husam Fezzani
Transformation Specialist
Bio:

Husam is an Agile Transformation Specialist with over 30 years of global tech experience in Financial Services, leading strategic IT initiatives across business functions. He specializes in large-scale Agile and DevOps transformations, optimizing tools like Jira and Confluence to boost efficiency, reduce costs, and enhance customer experience.

Profile picture of Eric Belisle
Eric Belisle
Transformation Specialist
Bio:

Eric is a collaborative transformation expert with over 30 years in IT and 5+ years as an Agile Coach, guiding teams to shift from reactive to proactive work. Known for blending technical insight with human-centered coaching, he’s helped clients across sectors dramatically improve efficiency, reduce urgent requests, and create more meaningful, balanced work environments.

Our Partners

Business Partner
Cree Cybersecurity logo

Cree Cyber Security Advisors Inc. is a trusted IT and cyber security advisory firm based in Vancouver, BC. They specialize in strategic IT risk, compliance, and governance, offering services such as Fractional CIO and CISO roles and comprehensive information security assessments to help organizations align their IT strategies with business objectives and navigate the complexities of today's digital landscape.

Tools Partner
IriusRisk logo

IriusRisk is a leading provider of automated threat modeling solutions, empowering organizations to design secure software from the outset. Founded in 2015, IriusRisk offers a platform that integrates seamlessly into the software development lifecycle, enabling teams to identify and mitigate security risks early in the design phase. Trusted by major global enterprises, including several of the world's top banks, IriusRisk is committed to making secure design a standard, scalable practice for all digital teams.

Why IncrementOne?

Practical Expertise
Our team brings decades of hands-on experience in both cyber security and agile development environments. We understand the real-world challenges of integrating security into fast-moving teams.
Cultural Focus
We recognize that technical solutions alone don't create secure organizations. Our approach addresses the human factors, team dynamics, and organizational culture needed for sustainable security.
Right-Sized Solutions
We don't believe in one-size-fits-all security. Our recommendations and implementations are tailored to your organization's size, industry, risk profile, and maturity level.
Long-Term Partnership
We're committed to your ongoing security journey. Our approach focuses on building your internal capabilities, not creating dependency on our services.

Begin Your Security Transformation

Security doesn't have to be overwhelming or disruptive. With IncrementOne's guidance, you can integrate robust security practices that protect your business while enhancing your development processes.