Frequently Asked Questions

Pricing & Plans

What are the pricing tiers for vCISO services?

Cynomi outlines three main pricing tiers for vCISO services: Basic (,500–,000/month), Intermediate (,000–,000/month), and Advanced (project-based or retainer, e.g., 0k for a 6-month contract). Each tier varies by scope, client size, and industry focus. [Source: Original Webpage]

What is included in the Basic vCISO service tier?

The Basic tier covers Governance, Risk & Advisory, including risk assessments, roadmaps, and policy writing/reviews. It is designed for companies with fewer than 1,000 employees in non-regulated industries. [Source: Original Webpage]

What is the scope of the Intermediate vCISO service tier?

The Intermediate tier adds compliance management to Governance, Risk & Advisory. It is suitable for regulated companies with 500–3,000 employees and includes risk assessments, roadmaps, policy writing/reviews, and compliance management. [Source: Original Webpage]

How is the Advanced vCISO service tier structured?

The Advanced tier is project-based or retainer, typically for regulated companies with 3,000+ employees. Engagements are short-term or interim, with higher complexity and value, such as 0k for a 6-month contract. [Source: Original Webpage]

What factors influence the cost of vCISO services?

Pricing depends on client size, industry, compliance requirements, engagement scope, and the level of expertise required. Advanced engagements for larger, regulated companies are more lucrative but require more resources. [Source: Original Webpage]

Are there any hidden costs associated with offering vCISO services?

Hidden costs may include professional insurance for medium-risk engagements, additional tools for compliance management, and the need for specialized personnel for advanced tiers. [Source: Original Webpage]

How does Cynomi help MSPs maximize ROI from vCISO services?

Cynomi enables MSPs to start with basic vCISO services for immediate ROI and efficient client management, then upsell to higher-value tiers as relationships and expertise grow. [Source: Original Webpage]

What is the recommended contract length for advanced vCISO engagements?

Advanced vCISO engagements are typically short-term projects or interim contracts, such as a 6-month engagement valued at 0k. [Source: Original Webpage]

How do monthly retainer models work for vCISO services?

Basic and Intermediate vCISO services are usually offered on a monthly retainer basis, allowing MSPs to manage multiple clients efficiently and ensure predictable revenue streams. [Source: Original Webpage]

What is the typical ratio of vCISO to clients for each service tier?

For Basic tier, one vCISO can manage up to 30 clients; Intermediate tier, up to 10 clients; Advanced tier, up to 2 clients due to higher complexity. [Source: Original Webpage]

Features & Capabilities

What are the key features of Cynomi's vCISO platform?

Cynomi offers AI-driven automation, compliance readiness across 30+ frameworks, embedded CISO-level expertise, branded reporting, centralized multitenant management, and a security-first design. [Source: Knowledge Base]

How does Cynomi automate manual cybersecurity processes?

Cynomi automates up to 80% of manual processes, including risk assessments and compliance readiness, reducing operational overhead and enabling faster service delivery. [Source: Knowledge Base]

What compliance frameworks does Cynomi support?

Cynomi supports over 30 cybersecurity frameworks, including NIST CSF, ISO/IEC 27001, GDPR, SOC 2, and HIPAA, allowing tailored assessments for diverse client needs. [Source: Knowledge Base]

Does Cynomi offer branded, exportable reporting?

Yes, Cynomi provides branded, exportable reports to demonstrate progress and compliance gaps, improving transparency and fostering trust with clients. [Source: Knowledge Base]

How does Cynomi's platform support scalability for service providers?

Cynomi enables MSPs and MSSPs to scale their vCISO services without increasing resources, thanks to automation and centralized management. [Source: Knowledge Base]

What integrations does Cynomi support?

Cynomi integrates with scanners (NESSUS, Qualys, Cavelo, OpenVAS, Microsoft Secure Score), cloud platforms (AWS, Azure, GCP), and workflows (CI/CD tools, ticketing systems, SIEMs) via API-level access. [Source: Knowledge Base]

Does Cynomi offer API-level access?

Yes, Cynomi provides API-level access for extended functionality and custom integrations. For documentation, contact Cynomi or refer to their support team. [Source: Knowledge Base]

How does Cynomi prioritize security in its platform design?

Cynomi employs a security-first design, linking assessment results directly to risk reduction and ensuring robust protection against threats, rather than focusing solely on compliance. [Source: Knowledge Base]

What technical documentation is available for Cynomi users?

Cynomi provides compliance checklists (CMMC, PCI DSS, NIST), NIST templates, a continuous compliance guide, and framework-specific mapping documentation. Resources are available at CMMC Compliance Checklist, NIST Compliance Checklist, and Continuous Compliance Guide. [Source: Knowledge Base]

How does Cynomi embed CISO-level expertise into its platform?

Cynomi integrates expert-level processes and best practices, enabling junior team members to deliver high-quality work and bridging knowledge gaps. [Source: Knowledge Base]

What is the user experience like on Cynomi's platform?

Cynomi features an intuitive interface praised for its ease of use, accessibility for non-technical users, and streamlined workflows that reduce ramp-up time for junior analysts. [Source: Knowledge Base]

Use Cases & Benefits

Who can benefit from Cynomi's vCISO services?

MSPs, MSSPs, and vCISOs serving SMBs, regulated industries, and organizations lacking in-house security expertise can benefit from Cynomi's scalable, efficient vCISO solutions. [Source: Original Webpage]

What are the main benefits for clients using vCISO services?

Clients gain enhanced security, cost efficiency, flexibility, access to expertise, and quick implementation, as well as continuous improvement and effective risk mitigation. [Source: Original Webpage]

How do vCISO services help MSPs grow revenue?

Offering vCISO services creates additional revenue streams, upselling opportunities, increased profit margins, and improved client retention through enhanced engagement and loyalty. [Source: Original Webpage]

What industries are represented in Cynomi's case studies?

Cynomi's case studies span legal, cybersecurity service providers, technology consulting, MSPs, and the defense sector. [Source: Knowledge Base]

Can you share customer success stories using Cynomi?

Yes. For example, CyberSherpas transitioned to a subscription model, CA2 reduced risk assessment times by 40%, and Arctiq cut assessment times by 60%. [Source: Knowledge Base]

What measurable business outcomes have Cynomi customers reported?

Customers report increased revenue, reduced operational costs, and improved compliance. CompassMSP closed deals 5x faster, and ECI achieved a 30% increase in GRC service margins while cutting assessment times by 50%. [Source: Knowledge Base]

How does Cynomi help address time and budget constraints?

Cynomi automates up to 80% of manual processes, enabling faster, more affordable engagements and helping organizations meet tight deadlines and operate within limited budgets. [Source: Knowledge Base]

How does Cynomi help MSPs upsell additional services?

Initial IT assessments can uncover sensitive data and highlight potential financial impacts of data breaches, providing opportunities to upsell higher-tier vCISO services. [Source: Original Webpage]

What pain points does Cynomi address for service providers?

Cynomi addresses time and budget constraints, manual processes, scalability issues, compliance and reporting complexities, lack of engagement tools, knowledge gaps, and consistency challenges. [Source: Knowledge Base]

How does Cynomi help junior team members deliver high-quality cybersecurity services?

Cynomi embeds expert-level processes and best practices, enabling junior team members to deliver high-quality work and accelerating ramp-up time. [Source: Knowledge Base]

Competition & Comparison

How does Cynomi compare to Apptega?

Apptega serves both organizations and service providers, while Cynomi is purpose-built for MSPs, MSSPs, and vCISOs. Cynomi offers AI-driven automation, embedded expertise, and supports 30+ frameworks, providing greater flexibility and ease of use. [Source: Knowledge Base]

How does Cynomi differ from ControlMap?

ControlMap requires moderate to high expertise and more manual setup. Cynomi automates up to 80% of manual processes and embeds CISO-level expertise, allowing junior team members to deliver high-quality work. [Source: Knowledge Base]

What makes Cynomi different from Vanta?

Vanta is direct-to-business focused and best suited for in-house teams. Cynomi is designed for service providers, offering multitenant management, scalability, and support for over 30 frameworks. [Source: Knowledge Base]

How does Cynomi compare to Secureframe?

Secureframe focuses on in-house compliance teams and requires significant expertise. Cynomi prioritizes security, links compliance gaps to security risks, and provides step-by-step, CISO-validated recommendations for easier adoption. [Source: Knowledge Base]

How does Cynomi's onboarding compare to Drata?

Drata is premium-priced and best suited for experienced in-house teams, with onboarding taking up to two months. Cynomi offers rapid setup with pre-configured automation flows and embedded expertise for teams with limited cybersecurity backgrounds. [Source: Knowledge Base]

What advantages does Cynomi offer over RealCISO?

RealCISO has limited scope and lacks scanning capabilities. Cynomi provides actionable reports, automation, multitenant management, and supports 30+ frameworks for flexibility and scalability. [Source: Knowledge Base]

How does Cynomi's ease of use compare to competitors?

Cynomi is consistently praised for its intuitive interface and accessibility for non-technical users, with a shorter ramp-up time compared to competitors like Apptega and SecureFrame, which have steeper learning curves. [Source: Knowledge Base]

What differentiates Cynomi for MSPs and MSSPs?

Cynomi is purpose-built for MSPs and MSSPs, offering centralized multitenant management, automation, and partner-centric features that streamline operations and enable scalability. [Source: Knowledge Base]

How does Cynomi address value objections?

Cynomi demonstrates value through unique benefits (increased revenue, reduced costs, enhanced compliance), cost-benefit analysis, customer case studies, trial periods, and testimonials. [Source: Knowledge Base]

Technical Requirements & Support

What qualifications are needed to deliver Basic vCISO services?

Basic vCISO services do not require hiring a CISO. Providers should have an understanding of security controls, tools, and basic compliance, with bonus points for 5+ years of experience in security/IT. [Source: Original Webpage]

What team structure is recommended for Intermediate vCISO services?

Intermediate vCISO services are best delivered by a team of two: one vCISO and an additional team member (analyst, project manager, etc.), with a CISO overseeing the service. [Source: Original Webpage]

What expertise is required for Advanced vCISO engagements?

Advanced vCISO engagements require a CISO or a vCISO who has completed at least 10 complex engagements, due to the higher complexity and value of the work. [Source: Original Webpage]

What tools are typically used for each vCISO service tier?

Basic tier uses one security management tool (e.g., Cynomi); Intermediate tier uses 2–3 tools (security management, GRC, project management); Advanced tier uses various client and MSP tools. [Source: Original Webpage]

What are the typical client touchpoints for each vCISO tier?

Basic tier: monthly or quarterly; Intermediate tier: weekly to quarterly; Advanced tier: multiple times a week, often with board engagement. [Source: Original Webpage]

What liability considerations exist for vCISO service providers?

Basic tier has low risk; Intermediate and Advanced tiers carry medium risk and require professional insurance due to increased complexity and responsibility. [Source: Original Webpage]

How does Cynomi support continuous compliance?

Cynomi provides a continuous compliance guide and automation tools to help organizations maintain always-on compliance across multiple frameworks. [Source: Knowledge Base]

What support resources are available for Cynomi users?

Cynomi offers technical documentation, compliance checklists, templates, and guides. For API documentation and integration support, users should contact Cynomi directly or access resources via their website. [Source: Knowledge Base]

How does Cynomi help maintain consistency in service delivery?

Cynomi standardizes workflows and automates processes, ensuring consistent delivery across engagements and eliminating variations in templates and practices. [Source: Knowledge Base]

Product Information & Vision

What is the primary purpose of Cynomi's vCISO platform?

Cynomi is designed to enable MSPs, MSSPs, and vCISOs to deliver scalable, consistent, and high-impact cybersecurity services without increasing headcount, leveraging AI-driven automation and embedded expertise. [Source: Knowledge Base]

How does Cynomi contribute to its overarching vision and mission?

Cynomi's mission is to transform the vCISO space by empowering service providers to deliver scalable, consistent, and high-impact cybersecurity services, fostering strong client relationships and measurable business outcomes. [Source: Knowledge Base]

What are the core problems Cynomi solves?

Cynomi solves time and budget constraints, manual processes, scalability issues, compliance and reporting complexities, lack of engagement tools, knowledge gaps, and consistency challenges for service providers. [Source: Knowledge Base]

How does Cynomi differentiate itself in solving pain points?

Cynomi leverages AI-driven automation, standardized workflows, purpose-built engagement tools, and embedded expertise to deliver scalable, efficient, and high-impact cybersecurity services, setting it apart from competitors. [Source: Knowledge Base]

What are the key capabilities and benefits of Cynomi?

Cynomi automates up to 80% of manual processes, supports 30+ frameworks, embeds CISO-level expertise, offers branded reporting, centralized management, and delivers measurable business outcomes such as increased revenue and reduced costs. [Source: Knowledge Base]

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Chapter 1: Building a vCISO offering

Will Birchett
“MSPs are leaving money on the table. MSPs are missing out on revenue by assuming they need to offer comprehensive security and compliance services right away. Instead, they can start with a simpler, basic offering as a first step.”
– William Birchett, Founder of The vCISO Network & President of Logo Systems

Recap from Introduction to vCISO Services: Why Service Providers want to Offer vCISO Services

vCISO services are especially attractive to MSPs and MSSPs as they address a growing need from their clients for proactive cyber resilience and compliance management while offering the potential to grow recurring revenues. 

The primary benefits for clients include: 

  • Enhanced security
  • Cost efficiency
  • Flexibility
  • Access to expertise
  • Quick implementation
Continuous improvement and effective mitigation of cyber risks.
Developer Coding
Accessing high-level expertise without the cost of a full-time executive.
Team members sitting at a computer
Tailoring services to meet the organization’s specific needs and scaling up or down as required.
Team brainstorming
Leveraging the experience of seasoned professionals who have worked across multiple industries.
Team Meeting
Rapidly deploying security strategies and responses to emerging threats. 
Academy-Lesson-1-Image-5.2

The primary benefits of offering vCISO services include: 

  • Additional revenue streams
  • Opportunity to upsell more products and services to existing clients
  • Increased profit margins (one person managing multiple clients)
  • Improved client security
  • Greater differentiation from competition
  • Enhanced client engagement and loyalty: Many vendors offering vCISO services claim that providing these services enhances their client intimacy allowing them direct contact with clients’ top management. 

Where to Begin: What to Offer and to Whom 

You’ve decided to offer vCISO services—great! The next step is structuring them. This chapter explores the tiers of vCISO offerings (more details below). By using the following assessment, you’ll be able to identify which services to provide and to whom, and then the three tiers will take you through the specifics of what to offer in each service level. Let’s dive in.

There are two main pathways to offering vCISO Services: 

  1. Upsell to your existing clients
  2. Expand to new clients

It may be effective to focus on existing clients first as an established relationship already exists, along with a clear understanding of their business needs. Begin by following these six steps to prioritize which clients to begin with.

Considerations to help structure your vCISO Offerings

1. Assess current offerings

 

Determine if you are already providing any form of vCISO services. Many MSPs and MSSPs offer partial vCISO solutions that can be expanded into comprehensive vCISO services.

IT team
2. Group clients by industry vertical
3. Understand compliance requirements
4. Evaluate client size and security needs
5. Prioritize high-potential clients
6. Develop a strategic upsell plan

You can take the below assessment to see where you are:

  • Do you currently manage your clients’ security?
  • Do you offer risk assessment or manage risk over time?
  • Do you support clients with compliance readiness?
  • Do you set a security strategy or write internal security policies?
  • Do you generate remediation plans?
  • Do you generate incident response plans?
  • Do you offer security awareness and training?
  • Do you communicate the security status to your clients’ management?

If you answered “yes” to four or more of these questions, you can most likely bundle your existing offering as a vCISO package. Surprisingly, you might be closer to a vCISO offering than you might think.

By leveraging your existing relationships, vCISO services can efficiently meet previously unmet needs, allowing you to grow your revenue through targeted upselling. This approach enables you to maximize the potential of your current clients before focusing on attracting new clients.

3 Levels of vCISO offerings

After identifying which of your existing clients are well-suited for vCISO services, you can review which vCISO offering is a good fit for them. 

There are three main types of vCISO offerings:

Basic Intermediate Advanced
Governance, Risk & Advisory  Governance, Risk, Advisory & Compliance Fractional CISO

Approximately 90% of MSPs fall into the first two categories of vCISO services. The third category, however, is built on relationships and trust, where the CISO must have strong confidence in the MSP or MSSP. This makes it largely dependent on the service providers’ reputation.

Many MSPs are unaware that there is a basic tier for vCISO services. They often invest in Governance, Risk and Compliance (GRC) tools and manage compliance but overlook security management. By not highlighting this capability, they miss out on potential opportunities. It’s important to understand that service providers can offer vCISO services without needing a compliance tracking tool.

Here’s a brief summary of the three service tiers and the types of clients they’re best suited for:

Governance, Risk & Advisory Governance, Risk, Advisory & Compliance Fractional CISO
Level of effort, cost, expertise Basic Intermediate Advanced
Knowledge level Strategic only (clients are usually not very strategic) Strategic and tactical Higher level of strategic and tactical
Demand 90% of SMBs will fall into these two buckets 90% of SMBs will fall into these two buckets 5% of SMBs
Who is it for? Companies with less than 1,000 employees, focusing on non-regulated industries Regulated companies with 500-3,000 employees Regulated companies with 3,000+ employees
Industries All industries except for government contractors, healthcare, finance, and critical infrastructure All industries, except for organizations with complex compliance requirements  All industries, including government contractors, healthcare, finance, critical infrastructure
Pricing $1,500 to $8,000 per month $4,000 to $10,000 per month Project based or retainer, varies widely

6-month contract = $100k

More lucrative because you’re dealing with larger companies
Scope Risk assessments
Roadmaps
Policy writing/reviews
Risk assessments
Roadmaps
Policy writing/reviews
Compliance management
Similar scope to the previous bucket, but with higher complexity levels: 

Risk assessments
Roadmaps
Policy writing/reviews
Compliance management
MSP/MSSP Qualifications Don’t need to hire a CISO

vCISO must have an: 

Understanding of security/ security controls

Understanding of tools being used to manage security

Basic understanding of compliance

Bonus: 5+ years of experience in security / IT
CISO hire is recommended to oversee the service but they don’t have to be engaged with every client

vCISO must have an: 

Understanding of security/ security controls

Understanding of tools being used to manage security

Intermediate understanding of compliance – ability to interpret and implement compliance frameworks (i.e. HIPA) 
CISO or a vCISO that has completed at least 10 complex engagements, is required
Service type Monthly retainer Monthly retainer Short-term project based work

Interim engagement while hiring
Tools used by the MSP/MSSP One toolSecurity management tool (i.e. Cynomi) 2-3 tools

Security management tool
GRC
Project management tool
Various client & MSP tools
Touchpoints with the client Monthly, quarterly Varying from weekly to quarterly Multiple times a week
Engagement with board May be speaking at board meetings Will probably be speaking at board meetings Will be working with the board and/or company CISO
Liability Low risk Medium risk, requires professional insurance Medium risk, requires professional insurance
Ratio of vCISO to clients 1:30
1 vCISO for up to 30 clients
1:10
1 vCISO for up to 10 clients
1:2
1 vCISO for up to 2 clients
vCISO engagement team size 1 person

One vCISO
2 people

One vCISO + an additional team member (analyst, project manager, etc.)
Ranges between 1 person to an entire team, varies by scope
Client security/IT makeup Client has:
IT: MSP/MSSP
Security: vCISO
Client has:
IT: In-house or MSP/MSSP
Security: vCISO
Client has:
IT: In-house
Security: In-house
Benefits to the vCISO Timeline: More immediate ROI, can start working quicklyDifferentiation: Low, more of a commodityProfitable: High rate of returnEfficient: One person can manage multiple clients efficientlyClient retention: Increased client loyaltyUpselling opportunities: Initial IT assessments can uncover sensitive data and highlight potential financial impacts of data breaches. This can be used to sell higher-tier services. Timeline: Long term, strategic advantage to specialization
Differentiation: High if you specialize
Profitable: Higher rate of return if you specialize in an industry vertical
Efficient operations: More efficient the more you specialize
Client retention: Higher client loyalty
Upselling opportunities: Initial IT assessments can uncover sensitive data and highlight potential financial impacts of data breaches. This can be used to sell higher-tier services.
Timeline: Long term, relationship based engagements
Differentiation: Very high, less competition when you work with bigger companies
Profitable: Higher value contracts
Type of work: More challenging, interesting work
Efficient operations: Low efficiency
Challenges for the vCISO Scope creep – Limiting the scope unless the client goes to a higher-value contract
Differentiation – This service is more of a commodity. Difficult to stand out from the competition.
Scope creep – Ensure you’re only advising and not doing the actual security and making decisions (could also result in liability issues)
Potential knowledge gaps with new regulations
Balancing customization with efficiency
Must have a CISO or senior security professional (experienced vCISO) do this
Not efficient

Suggested reading:

Chapter 1 Key Takeaways

  1. Start with low hanging fruit:
    • MSPs can start with basic vCISO services rather than comprehensive offerings. Begin with simple, strategic security services and gradually upsell to existing clients, identifying those already receiving partial vCISO solutions that can be expanded.
  2. Assess and segment clients:
    • Group clients by industry verticals to understand common needs and compliance requirements. Evaluate client size and security needs to prioritize high-potential clients for upselling strategic security services.
  3. Build your offering in tiers:
    • Understand the three main service buckets for vCISO offerings: Basic (Governance, Risk & Advisory), Intermediate (Governance, Risk, Advisory & Compliance), and Advanced (Fractional CISO). 90% of MSPs will fall into the first two categories.
  4. Weigh immediate and long-term benefits:
    • Understand the immediate and long-term benefits of each tier. For example, basic services offer a high rate of return and efficient client management, while intermediate services can provide higher rates of return over time, but are less efficient in the short term. 
  5. Address challenges and optimize operations:
    • Be aware of potential challenges such as scope creep and knowledge gaps with new regulations. Ensure a clear distinction between advisory roles and actual security implementation to avoid liability issues. Specializing in industry verticals can lead to higher returns and more efficient operations over time.