Contact us
Login
Home
vCISO Platform
Use Cases
Use Cases
Set Up New vCISO Services
Scale Existing vCISO Services
Risk Assessments
Compliance Assessments
Company
Company
About Us
Contact
News
Events & Webinars
Careers
Partners
Resources
Resources
2024 In Review
Blog
Datasheet
eBooks
Guides
Reports
Webinars
Case studies
Testimonials
vCISO Academy
Request a Demo
Request a Demo
Home
vCISO Platform
Use Cases
Use Cases
Set Up New vCISO Services
Scale Existing vCISO Services
Risk Assessments
Compliance Assessments
Company
Company
About Us
Contact
News
Events & Webinars
Careers
Partners
Resources
2024 In Review
Datasheet
eBooks
Guides
Reports
Webinars
Case studies
Testimonials
Blog
Contact Us
Login
Request a Demo
Education
Rotem Shemesh — June.18.2024
What MSPs & MSSPs need to know about NIST 2.0, in 4 questions
Learn More
Rotem Shemesh — June.10.2024
What is a vCISO Platform and Where Should You Start?
Learn More
Amie Schwedock — April.9.2024
The Ultimate vCISO Checklist
Learn More
Rotem Shemesh — May.10.2023
Top IT Security Policies to Implement: Workstation Security Copy
Learn More
Rotem Shemesh — September.28.2023
Top IT Security Policies to Implement: Human Resources
Learn More
Rotem Shemesh — June.13.2023
Top IT Security Policies to Implement: Email Security
Learn More
Rotem Shemesh — May.20.2024
Top 8 MSP Software Solutions for 2024
Learn More
Rotem Shemesh — June.26.2024
The Easy-to-use Incident Response Policy Template
Learn More
Amie Schwedock — June.5.2024
The Crucial Risk Assessment Template for Cybersecurity
Learn More
Amie Schwedock — October.31.2024
The Business Impact Analysis Template for Download
Learn More
David Primor — October.22.2024
Strengthening the vCISO Ecosystem by Launching the vCISO Academy
Learn More
Rotem Shemesh — August.23.2023
5-fold Increase in MSPs and MSSPs Offering vCISO Services, New Report Finds
Learn More
Rotem Shemesh — January.19.2023
How to start a vCISO practice
Learn More
Rotem Shemesh — February.13.2023
How Service Providers Can Scale vCISO Services to Boost Revenue and Upselling
Learn More
Rotem Shemesh — March.1.2023
The Risks and Benefits of Starting a vCISO Practice
Learn More
Rotem Shemesh — July.31.2023
Riding the vCISO Wave: How to Provide vCISO Services
Learn More
David Primor — August.31.2023
NIST CSF 2.0 and Its Impact on MSPs and MSSPs
Learn More
Amie Schwedock — August.2.2024
Information Security for Small and Midsized Businesses – An Essential Guide for SMBs and vCISOs Alike
Learn More
Amie Schwedock — December.10.2023
vCISO’s First 100 Days: The Playbook
Learn More
Rotem Shemesh — October.16.2023
The Surge in vCISO Services: Why MSPs and MSSPs Can’t Afford to Lag Behind
Learn More
David Primor — December.18.2023
Security Predictions for MSSPs and MSPs 2024
Learn More
Rotem Shemesh — November.5.2023
Managed Service Providers Must Step Up to Help Their Customers Minimize Generative AI Risk
Learn More
Rotem Shemesh — January.4.2024
6 Ways to Drive MSP/MSSP Business Revenue with Cynomi
Learn More
David Primor — January.24.2024
5 Quick Steps to Create Generative AI Security Standards [+ free policy]
Learn More
Anita Kaneti — October.15.2024
How to Perform a Quantitative Risk Assessment in Cybersecurity
Learn More
Rotem Shemesh — June.28.2023
How to Choose a vCISO Service Provider: 7 Considerations
Learn More
Anita Kaneti — July.17.2024
From MSP to vCISO: 5 Steps to vCISO Success
Learn More
Rotem Shemesh — July.19.2024
Fraud Risk Assessment: 5 Essentials Every Plan Must Have
Learn More
Rotem Shemesh — February.5.2023
FAQs About vCISO Services
Learn More
Amie Schwedock — July.1.2024
Cyber Insurance: The Next SME Upsell Opportunity for MSPs/MSSPs
Learn More
Amie Schwedock — July.8.2024
Change Healthcare Ransomware: What You Need to Know
Learn More
Rotem Shemesh — May.29.2023
An easy way for MSPs and MSSPs to boost virtual CISO offering
Learn More
Rotem Shemesh — March.21.2023
9 Best Practices for Managing a Successful MSSP
Learn More
Rotem Shemesh — May.8.2024
8 Essential Components Every Dynamic Risk Assessment Must Have
Learn More
Amie Schwedock — June.28.2024
7 Risk Assessment Methods to Streamline Risk Management
Learn More
Rotem Shemesh — July.3.2024
7 Essential Components for Cyber Risk Management
Learn More
Amie Schwedock — October.28.2024
6 Steps to Implement Automated Incident Response
Learn More
Amie Schwedock — October.21.2024
6 Best Practices for Performing a Fraud Risk Assessment
Learn More
Rotem Shemesh — April.16.2023
5 Ways to Differentiate Your MSSP
Learn More