Cybersecurity Listings

The cybersecurity service sector in the United States encompasses hundreds of distinct provider types, credential frameworks, and regulatory classifications — from managed detection and response firms operating under NIST frameworks to penetration testing practices credentialed through CREST or GIAC. This listings reference covers the structure of the directory, how individual entries are formatted, what categories of information are and are not included, and where coverage gaps currently exist. The Security Services Directory Purpose and Scope page provides the broader organizational context for how this directory is structured.


How to read an entry

Each listing in this directory follows a standardized field schema designed to support professional comparison across providers, not promotional ranking. Entries are organized by service category first, then by geographic coverage (national, regional, or state-specific), and finally by regulatory alignment.

A standard listing entry contains the following fields in this order:

  1. Provider name — Legal business name, not a trade brand alias
  2. Service category — Primary classification drawn from the taxonomy described below
  3. Geographic coverage — National, multi-state, or single-state designation
  4. Credential and framework alignment — Named certifications (e.g., ISO/IEC 27001, SOC 2 Type II, FedRAMP Authorization, CMMC level designation)
  5. Regulatory focus — Applicable frameworks such as HIPAA, PCI DSS, FISMA, or NERC CIP, where publicly disclosed
  6. Contact and verification status — Whether entry data has been independently cross-referenced against public records

Entries do not contain editorial ratings, client reviews, service levels, or comparative scoring. The distinction between a basic listing and a verified listing is addressed in the Verification Status section below. Readers using this directory for procurement research should cross-reference listings against the How to Use This Security Services Resource page before engaging any listed provider.

Service categories used in this directory align with the NIST Cybersecurity Framework 2.0 functional domains — Govern, Identify, Protect, Detect, Respond, and Recover — as the primary classification axis. Secondary classification uses CISA's defined cybersecurity service sectors, which group providers by delivery model: managed services, advisory and assessment, implementation, and incident response.


What listings include and exclude

Included:

Excluded:

The exclusion of product-only vendors is a deliberate structural boundary. The FTC and CISA distinguish between cybersecurity product vendors and service providers in regulatory guidance; this directory reflects that distinction by covering only entities whose primary commercial activity involves delivering services to client organizations.


Verification status

Listings in this directory carry one of three verification designations:

Credential verification draws on publicly accessible lookups maintained by ISC², ISACA, CompTIA, EC-Council, CREST, and GIAC. FedRAMP authorization status is cross-referenced against the FedRAMP Marketplace, which lists authorized cloud service offerings by provider. CMMC certification status, where claimed, is cross-referenced against the CMMC Accreditation Body's publicly maintained assessor registry.

Verification status does not constitute an endorsement. A verified listing confirms only that the stated credentials or registrations existed at the time of verification. Credential expiration, revocation, or scope changes after verification are not reflected in real-time. The full Security Services Listings index displays verification badges adjacent to each entry.


Coverage gaps

This directory does not achieve uniform coverage across all cybersecurity service categories or geographies. Documented gaps include:

By category:
- Cyber insurance advisory services — a growing practice area lacking standardized credential frameworks, making classification boundary enforcement inconsistent
- Digital forensics and legal support firms — overlap with legal professional directories creates incomplete coverage; fewer than 40% of known US digital forensics firms have submitted or been sourced for listing
- Emerging AI security practices — providers specializing in adversarial machine learning, model integrity testing, and LLM security are underrepresented because no governing body has yet established a recognized credential framework for this subspecialty as of 2024

By geography:
- Rural and mid-market regional providers in states outside California, Texas, Virginia, New York, and Florida are underrepresented relative to their estimated market presence
- Tribal nation and US territory providers — entities operating in Puerto Rico, Guam, and on federally recognized tribal lands face inconsistent business registration structures that complicate standard verification workflows

Gaps are not treated as permanent. Providers meeting the inclusion criteria above may be submitted for review through the contact pathway. Coverage expansion is prioritized by service category demand and verifiability of credential documentation, not by geographic proximity or provider size.