Resource Library

Resources for IT, Cyber, AIand Compliance Leaders

A working library from Petronella Technology Group: deep guides, hard-won blog lessons, free assessments, on-demand training, and reference frameworks. Built by practitioners who run a Raleigh-based MSP, MSSP, and CMMC Registered Practitioner Organization since 2002.

CMMC Registered Practitioner Org|BBB A+ Since 2003|23+ Years in the Triangle

Most resource pages are link dumps. This one is not. Every guide, blog post, and tool below has been used inside real client engagements: ransomware recoveries, CMMC Level 2 readiness assessments, HIPAA security risk assessments, AI workload buildouts, and the slow grind of getting a small business from "we have antivirus" to a defensible, audit-ready security program. If you are an IT director, CIO, compliance lead, or owner-operator trying to make sense of cybersecurity, AI adoption, and regulated industry compliance, start here.

The library is organized by what you are trying to do. If you need a strategic playbook, jump to the featured guides. If you want to learn fast on a specific topic, browse the most-read blog posts. If you need to baseline your current risk, run a free assessment. If you want structured, on-demand learning for your team, see the Training Academy. Use what you need. Skip what you do not. Everything links to deeper coverage when you want it.

A short note on point of view. Petronella Technology Group is a Raleigh-based MSP, MSSP, digital forensics shop, and CMMC Registered Practitioner Organization that has been operating in the Triangle since 2002. Our team holds CMMC-RP credentials across the bench, plus hands-on certifications in network engineering (CCNA), wireless (CWNE), and digital forensics (DFE #604180 for the founder). That background shapes every resource on this page. We do not write speculative thinkpieces about technology we have never deployed. We write about ransomware because we have done the recovery. We write about CMMC because we sit in the gap-assessment chair. We write about private AI because we run the inference servers. The library is opinionated on purpose, because most of the content out there is sponsored and most of the advice out there is generic.

One more thing. Nothing on this page sits behind a wall. There is no email gate on the blog, no credit card on the free tools, and no obligation to talk to a salesperson before you can read a guide. We share these resources because the security baseline of the small-business community is too low, and because we would rather have an educated conversation when a client does call us than spend the first thirty minutes of every prospect call explaining what zero trust actually means. If anything below sparks a question, the easiest path is to call (919) 348-4912 or schedule through the contact page.

Training Academy

On-Demand Training and Certification

For teams that want structured learning instead of scattered blog posts. The Petronella Training Academy is a subscription LMS with cohort-style and self-paced tracks across cybersecurity, AI, compliance, and the operating playbook our own MSP runs on.

The Academy works well for three audiences. First, internal IT and security teams that need consistent, role-aligned training instead of cobbling together vendor courses. Second, MSPs and IT services firms that subscribe to the Partner Program for white-label playbooks, sales templates, and the Operator Council. Third, business owners who want their staff trained on phishing resilience, AI safety, and HIPAA basics without the dry e-learning feel.

Tracks include CMMC fundamentals, HIPAA workforce training, private AI deployment, vCISO operations, and the MSP Partner Program for owner-operators of IT service firms. New cohorts launch quarterly. See the catalog and pricing inside the Academy.

Podcast and Video

Podcast Appearances and Video Library

Long-form conversations on cybersecurity, AI, CMMC, and what is actually happening in the regulated mid-market. Use these for background while you commute, or send them to a leadership team that needs context before a strategy call.

Craig Petronella has been a recurring guest on cybersecurity, MSP, and small-business technology shows since the early 2000s, and the YouTube library mirrors the same teaching style as the blog: practical, opinionated, and grounded in what works inside real client engagements. Episodes cover ransomware response, CMMC certification storylines, the AI privacy debate, and post-incident lessons learned. New short-form clips and full-length podcast guest spots are added regularly.

Free Assessments and Tools

Free Tools and Self-Service Assessments

Use these to baseline your current posture in an afternoon. Nothing here requires a sales call or credit card. Each tool is built from the same intake questions our analysts ask during paid assessments, so the output is genuinely useful even if you never become a Petronella client.

Compliance Frameworks

Compliance Framework Reference Library

Deep reference pages on every framework Petronella Technology Group implements end-to-end. Use these as starting points for scoping conversations with your auditor, attorney, or board.

Compliance framework documentation is, frankly, hard to read. The official NIST and CMMC source documents are written for assessors, not for the IT teams who actually have to implement the controls. The reference pages below translate the source material into plain English, group related controls so you can see how they cluster operationally, and flag the controls that consistently cause the most heartburn during real assessments. Use them when scoping a project, drafting a System Security Plan, or briefing a board on what your compliance posture actually means.

If you are working across multiple frameworks (which is most regulated organizations: a defense contractor with healthcare clients, a financial firm processing card data, a research university with both FERPA and CMMC obligations), the CMMC-to-NIST mapping page is the single most useful reference on this site. It shows which controls satisfy multiple frameworks simultaneously, so you do not end up writing five different versions of the same access-control policy.

Industry Resources

Resources by Industry

Every regulated industry has a different threat model, compliance posture, and operational reality. These industry pages collect the guides, blog posts, and assessments most relevant to each sector our team supports.

An IT director at a sixty-bed clinic does not have the same problems as an IT director at a twenty-person law firm or a defense subcontractor manufacturing components for a tier-one prime. They use different software, face different auditors, and worry about different attack patterns. The industry pages below collect the most relevant guides, blog posts, and case-study material for each sector. They are starting points, not exhaustive directories. If you do not see your industry called out specifically, the underlying compliance and security work usually maps to one of the existing pages: most professional services firms find what they need on the law firm and financial services pages, and most public-sector or grant-funded organizations find what they need on the non-profit and education resources.

Get the UnHackable Newsletter

A short, useful weekly note from the Petronella team on what changed in cybersecurity, compliance, and AI for regulated mid-market organizations. No fluff, no recycled vendor news, no daily blast. Read it in three minutes, archive it, move on with your day.

Subscribe to the Newsletter
FAQ

How to Use This Resource Library

A few common questions from IT leaders, compliance officers, and business owners using these resources for the first time.

Where should I start if I am new to all of this?
If you are responsible for IT or security at a small-to-mid-market organization and you are starting from scratch, work through three things in order. First, run the Security Risk Self-Assessment to find out where you stand. Second, read whichever flagship guide matches your top compliance pressure (the CMMC Guide, the HIPAA Guide, or the AI Implementation Guide). Third, schedule a free consultation if you want a Petronella analyst to interpret your assessment results and help you prioritize. None of these steps cost anything.
Are the free assessments and templates actually useful, or are they marketing fluff?
They are the same intake instruments our paid analysts use during the first phase of a real engagement. The 4-Pillar Security Risk Assessment framework, the incident response plan template, and the CMMC checklist all come straight out of client deliverables. We share them because educated buyers make better clients, and because frankly, the security baseline of the small-business community needs to come up. Use them, copy them, modify them for your team. There is no catch.
How do the blog and the flagship guides differ?
The blog is for fast learning on specific topics. Posts are typically 1,500 to 4,000 words and cover one question deeply. The flagship guides (CMMC, HIPAA, AI, and MSP Accelerator) are longer-form, more structured, and meant to be project blueprints you reference repeatedly across an engagement. If you are scoping a body of work, start with the guide. If you are answering a single question or evaluating a single tool, start with the blog.
Can my team use these resources for our own internal training?
Yes. The blog, the guides, and the free templates can be circulated, printed, or referenced inside your organization. For structured curriculum delivered to your team on a recurring basis, the Petronella Training Academy is the formal subscription product. Many MSPs and IT leaders also book a Private Session when they want a working session on a specific topic for their leadership team.
How often is this library updated?
The blog publishes on a weekly cadence with new posts on whatever topic is most active across our client base. Flagship guides are updated whenever the underlying regulation, framework, or technology changes meaningfully (typically two to four major refreshes per year). Compliance framework reference pages track the official NIST, CMMC, and HIPAA publication cycles. Subscribe to the UnHackable Newsletter if you want a weekly summary of what changed.
Do you serve clients outside the Raleigh-Durham area?
Yes. Petronella Technology Group is headquartered in Raleigh, NC at 5540 Centerview Drive, and we provide on-site service throughout the Triangle region (Durham, Chapel Hill, Cary, Apex, Research Triangle Park, and surrounding cities). Managed services, vCISO, CMMC readiness, HIPAA assessments, and private AI work are delivered remotely to clients across the country. Call (919) 348-4912 or use the contact form to talk through your situation.
I am an MSP or IT services firm. Is anything here useful to me?
Quite a bit, actually. The MSP Accelerator Playbook is built specifically for owner-operators of IT service firms, and the MSP Partner Program includes white-label playbooks, sales templates, the Operator Council peer group, and a wholesale path for AI, CMMC, and forensics services your clients are starting to ask for. Many of the blog posts (especially the CMMC and zero-trust vendor comparisons) are written with peer MSPs in mind.
Get Started

Want a Working Session With a Petronella Analyst?

If you have been through the resources here and want a real conversation about your environment, your compliance pressures, or your AI roadmap, schedule a free consultation. No sales script. Just a working call with a senior practitioner.