• Email favicon Contact us
  • Login Icon Login
Logo
  • Home
  • vCISO Platform
  • Use Cases
    • Use Cases
    • Set Up New vCISO Services
    • Scale Existing vCISO Services
    • Risk Assessments​
    • Compliance Assessments
  • Company
    • Company
    • About Us
    • Contact
    • News
    • Events & Webinars
    • Careers
    • 2024 In Review
  • Partners
  • Resources
    • Resources
    • Blog
    • Datasheet
    • eBooks
    • Learn
    • Guides
    • Reports
    • Webinars
    • Case studies
    • Testimonials
    • NIST Hub
    • Path to vCISO
  • vCISO Academy
  • Request a Demo
Logo
Request a Demo
  • Home
  • vCISO Platform
  • Use Cases
    • Use Cases
    • Set Up New vCISO Services
    • Scale Existing vCISO Services
    • Risk Assessments
    • Compliance Assessments
  • Company
    • Company
    • About Us
    • Contact
    • News
    • Events & Webinars
    • Careers
    • 2024 In Review
  • Partners
  • Resources
    • Datasheet
    • eBooks
    • Learn
    • Guides
    • Reports
    • Webinars
    • Case studies
    • Testimonials
    • NIST Hub
    • Path to vCISO
  • Blog
  • Contact Us
  • Login
  • Request a Demo

Top Security Policies

CrowdStrike incident and business continuity plan
David Primor — July.31.2024

What the 2024 CrowdStrike Incident Means for MSPs/MSSPs

Learn More
What MSPs & MSSPs need to know
Rotem Shemesh — June.18.2024

What MSPs & MSSPs need to know about NIST 2.0, in 4 questions

Learn More
CMMC 2.0
David Primor — June.12.2024

Understanding CMMC 2.0: What MSPs & MSSPs Need to Know

Learn More
v1_Top IT Security Policies to Implement
Rotem Shemesh — May.10.2023

Top IT Security Policies to Implement: Workstation Security Copy

Learn More
Top IT Security Policies to Implement: Email Security
Rotem Shemesh — June.13.2023

Top IT Security Policies to Implement: Email Security

Learn More
Top IT Security Policies to Implement: Cybersecurity Awareness
Rotem Shemesh — July.19.2023

Top IT Security Policies to Implement: Cybersecurity Awareness

Learn More
NIS2
David Primor — August.8.2024

The NIS 2 Directive: Impact on MSPs, MSSPs and Their Clients

Learn More
Managed Service Providers Must Step Up to Help Their Customers Minimize Generative AI Risk
Rotem Shemesh — November.5.2023

Managed Service Providers Must Step Up to Help Their Customers Minimize Generative AI Risk

Learn More
Logo
ISO-27001 logo AICPA SOC 2 TYPE II Certified logo

Home

vCISO Platform​

Use Cases

  • Scale Existing vCISO Services
  • Set Up New vCISO Services
  • Provide Comprehensive Risk Assessments
  • Provide Compliance Assessments

About

  • Events & Webinars
  • About
  • Partners
  • vCISO Platform
  • Contact
  • Careers
  • About
  • Partners
  • vCISO Platform
  • Use Cases
Logo
ISO-27001 logo AICPA SOC 2 TYPE II Certified logo
  • Youtube
  • Linkedin
  • © Cynomi Ltd
  • |
  • Terms
  • |
  • Privacy Policy
  • Youtube
  • Linkedin