Security Leadership

Virtual CISOServices

A full-time Chief Information Security Officer is a six-figure hire most small and mid-size businesses cannot justify, but they still need strategic security leadership. Petronella Technology Group provides virtual CISO retainers scoped to your environment, with named CMMC-Registered Practitioners and a full implementation team behind every recommendation. Pricing is custom-quoted to your framework count, team size, and risk posture - call (919) 348-4912 or schedule a 30-minute discovery call.

CMMC-AB RPO-1449|BBB A+ Since 2003|Founded 2002|Raleigh, NC
The Problem

Why Your Business Needs Security Leadership

Cybersecurity is no longer just an IT problem. It is a board-level risk that demands strategic ownership. Buyers, regulators, primes, insurers, and customers expect a named security executive who can articulate the company's risk posture in plain English, run the compliance program, sign off on incident response, and translate every dollar of security spend into measurable risk reduction.

Without that role, three things happen. Security decisions default to the IT team, who are paid to keep systems running rather than to manage risk. Spending becomes reactive: a breach, an insurer demand, a failed pen test, then a panic purchase of yet another tool. And when the inevitable security questionnaire arrives from an enterprise buyer, no one is qualified to fill it out, so the deal stalls or vanishes.

Hiring a full-time CISO solves the problem at the wrong price. A qualified candidate with CISSP, CISM, or equivalent credentials, plus three to five years in your vertical, is a six-figure hire that takes six to nine months to close. You also need to give them a budget, a team, and time to build the program. Most mid-market companies do not have that runway.

The virtual CISO model collapses the timeline. We embed an experienced security leader at the cadence you need, anywhere from a few hours a month for a small team on a single framework, up to a part-time embedded executive carrying multiple programs.

The retainer is fixed for the term you select. Deliverables are scheduled. Board memos arrive on time. When something explodes, your retainer absorbs the response instead of triggering a change order.

Pricing is scoped to your environment. We size the engagement to your framework count, team size, and risk posture, then quote a flat monthly fee. No surprise hourly bills. Call (919) 348-4912 or schedule a discovery call to start.

What a vCISO Does

Virtual CISO Responsibilities

Everything a full-time CISO would do, scaled to your business size and budget. The vCISO model is also called fractional CISO, outsourced CISO, ciso as a service, and part-time CISO; the function is the same.

Strategic Leadership

  • Develop and maintain the information security program
  • Present security posture and risk to board and leadership
  • Align security investments with business priorities
  • Vendor risk management and security questionnaires
  • Security budget planning and ROI analysis

Operational Oversight

  • Compliance program management for CMMC L1, L2, and L3, HIPAA, NIST 800-53, NIST CSF 2.0, SOC 2, ISO 27001, DFARS, and PCI DSS, paired with our productized ComplianceArmor SKUs when you need flat-fee documentation
  • Security policy development and maintenance
  • Incident response planning and coordination
  • Security awareness training program oversight (annual SAT for the whole workforce)
  • Risk assessment and vulnerability management
Engagement Tiers

Four vCISO Engagement Tiers

Pick the engagement shape that matches your obligation, then call us for a custom quote. Every tier is a fixed monthly retainer with a published minimum-term commitment so the work compounds. No hourly billing, no surprise invoices, no scope-creep. Hours that do not roll forward bank for 30 days, then expire.

Starter

Engagement Cadence
Quarterly
async monthly check-in
6-month minimum
  • Approximately 5 hours per month of senior advisory time
  • Quarterly written board memo
  • Async monthly posture review
  • Written gap-remediation roadmap
  • One primary framework (CMMC L2, HIPAA, NIST CSF 2.0, or SOC 2)
  • Policy library access and templates

For small teams with one active compliance obligation, recently received a flow-down clause, or stepping out of a Gap Analysis into ongoing leadership. Call for a custom quote.

Standard

Engagement Cadence
Monthly
cadence call + dashboard
12-month minimum
  • Approximately 15 hours per month, monthly cadence call
  • Monthly executive risk dashboard
  • Up to 4 vendor risk reviews per year
  • Annual tabletop exercise with written report
  • Two primary frameworks running together
  • Annual penetration test coordination and remediation
  • Incident response runbook maintained quarterly

Most active vCISO clients sit here. Right when you carry obligations to two stakeholders or your board has cyber as a quarterly agenda item. Call for a custom quote.

Plus

Engagement Cadence
Bi-weekly
+ 4-hour IR coordination SLA
12-month minimum
  • Approximately 30 hours per month, bi-weekly cadence
  • 4-hour incident response coordination SLA
  • Quarterly board attendance, not memo-only
  • Semi-annual tabletop exercises
  • Three primary frameworks in parallel
  • Unlimited vendor risk reviews
  • Co-signed regulatory submissions where permitted
  • Two penetration tests coordinated per year

For companies with material exposure, multi-site SOC 2, ePHI in volume, or CUI on multiple contracts. Bridge-CISO during a 9-12 month executive search. Call for a custom quote.

Enterprise

Engagement Cadence
Embedded
part-time, on-site availability
24-month minimum
  • Custom-scoped embedded part-time CISO
  • Named individual on senior leadership roster
  • On-site availability and continuous responsiveness
  • Unlimited frameworks and multi-site governance
  • M&A diligence and PE due-diligence cyber lead
  • Direct co-leadership of internal IT or security teams

PE-backed, multi-site, or three-plus frameworks at once. Companies that should hire a CISO but cannot wait six to nine months for the search. Call for a custom quote.

Pricing is scoped to your environment. Actual retainer is confirmed during a free scoping call based on framework count, headcount, audit cadence, and incident response coverage. We quote a flat monthly fee with no surprise hourly bills.

Cancellation requires 30-day written notice. We do not refund unused time within the agreed minimum term. You can upgrade tiers at the next billing cycle without penalty; the minimum term resets to the new tier on upgrade.

Pair any tier with our productized ComplianceArmor offers for documentation deliverables to compress your time-to-audit-ready by months. Call (919) 348-4912 or schedule a 30-minute discovery call to scope your engagement.

Frameworks We Cover

Compliance Frameworks the vCISO Runs

A vCISO is only as useful as the frameworks they actually know. Our team has walked clients through every framework below in the past 23 years.

CMMC L1, L2, and L3. We consult on all three Cybersecurity Maturity Model Certification levels. Level 1: Federal Contract Information, 17 basic safeguarding requirements, annual self-attestation.

Level 2: Controlled Unclassified Information, the 110 controls of NIST SP 800-171 Rev 2, third-party C3PAO assessment for prioritized acquisitions. Level 3: higher-risk CUI with controls from NIST SP 800-172 plus L2, government-led DIBCAC assessment.

Pair the vCISO retainer with our CMMC L2 readiness package for SSP authoring, POAM remediation, and evidence binder construction.

HIPAA Security Rule. The HIPAA Security Rule at 45 CFR Part 164 requires a Risk Analysis under 45 CFR 164.308(a)(1)(ii)(A) plus 18 standards across administrative, physical, and technical safeguards. We have walked covered entities, business associates, and SaaS-vendor BAA subcontractors through Risk Analysis cycles.

There is no HHS-issued HIPAA certification. Our work aligns documentation to NIST SP 800-66 Rev 2 and the HHS Office for Civil Rights audit protocol. Self-attestation only. We never claim certification authority we do not hold.

NIST SP 800-53 Rev 5 and NIST CSF 2.0. NIST SP 800-53 Rev 5 covers 20 control families across more than a thousand individual controls and enhancements. NIST Cybersecurity Framework 2.0 was released in February 2024 and added a sixth function (GOVERN) to the original five (IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER).

For state agencies, regional governments, and commercial enterprises that want a maturity model rather than a hard regulatory mandate, CSF 2.0 is usually the right entry point.

SOC 2 Type I and Type II. The AICPA SOC 2 framework covers five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy. Most SaaS buyers ask for Type I to start, then Type II once you have six to twelve months of evidence.

Our vCISOs handle auditor liaison, evidence collection, and control mapping. Pair the retainer with our productized SOC 2 Type I package for both documentation and program management. The CPA fee for the actual audit is paid separately to a third-party auditor and varies by auditor and scope; we coordinate auditor selection during the engagement.

ISO 27001:2022, DFARS, and PCI DSS. ISO/IEC 27001:2022 is the international standard for Information Security Management Systems with 93 Annex A controls under four themes. DFARS 252.204-7012 covers safeguarding of covered defense information; DFARS 252.204-7019 requires a current NIST SP 800-171 self-assessment posted to the Supplier Performance Risk System.

PCI DSS v4.0.1 covers 12 control areas across cardholder data environments. We also routinely work with CCPA, state privacy laws, CJIS Security Policy, GDPR, FedRAMP Moderate, and FERPA.

90-Day Onboarding

What a vCISO Engagement Actually Looks Like

The first 90 days set the cadence for the rest of the engagement. Here is what to expect, regardless of tier.

Days 1 to 7: discovery and onboarding. You receive a written engagement letter with the tier you selected, the named vCISO assigned to your account, the lock-in term, the cadence calendar, and the secure document portal credentials.

We start an inventory of your current security posture: existing policies, last audit reports, current control implementations, vendor list with BAAs and MSAs, incident history if any. The first week also includes a kickoff call with the executive sponsor and the working sponsor, typically your IT director or operations lead.

Days 8 to 30: baseline and roadmap. We deliver a written current-state assessment within 30 days. It maps your existing controls to whatever framework you carry, identifies gaps with priority ranking, and produces a 90 to 180 day remediation roadmap.

The roadmap is written for the executive reader, not a control-level checklist. The assessment is honest. If you have spent a year telling your board you are 80 percent ready for SOC 2 and the truth is closer to 45 percent, the assessment says 45 percent. We do not deliver a sugar-coated baseline.

Days 30 to 60: first execution cycle. We begin executing the highest-priority gap remediation work alongside your team. Depending on your tier, we run monthly or bi-weekly cadence calls.

We start the policy refresh cycle and open the vendor risk review queue. If you carry HIPAA, we start the Risk Analysis. If you carry CMMC L2, we begin the SSP and POAM build. If you carry SOC 2, we open the control matrix and start gathering evidence in your secure document portal.

Days 60 to 90: first board memo and program rhythm. Your first quarterly board memo lands at day 75 to 90. Two pages, executive summary on top, plain English. We attend the board meeting on Plus and Enterprise tiers, or stand by for questions during the agenda item on Standard.

The cadence is now established: monthly review call, quarterly written memo, semi-annual tabletop on Plus and Enterprise, annual program refresh, continuous vendor risk and incident readiness.

Steady state: months four onward. The work shifts toward continuous monitoring, audit prep when assessment cycles arrive, vendor risk review on every new contract, incident response coordination if an event occurs, and ongoing executive education.

The first time your auditor or assessor walks in, the program is already audit-ready. Evidence is collected, policies are signed, artifacts are versioned, and gaps are documented in a current POAM. We run through the audit prep with you twice before the assessor arrives. Surprises during the assessment are rare and recoverable. That predictability is what the retainer pays for.

Who Needs a vCISO

Signs Your Organization Needs a Virtual CISO

You Have Compliance Requirements

HIPAA, CMMC, SOC 2, PCI DSS, NIST 800-53, ISO 27001, and other frameworks require a documented security program with named accountability. A vCISO provides the security leadership that auditors, C3PAOs, and assessors expect to see, without the cost of a full-time executive.

You Are Losing Enterprise Deals

Enterprise customers send security questionnaires before signing contracts. Without a CISO to manage these assessments and demonstrate a mature security program, you lose deals to competitors who can. A vCISO turns security into a competitive advantage instead of a procurement blocker.

Your Security Spending Is Reactive

If you buy security tools only after incidents or auditor findings, you are spending more and getting less than organizations with strategic security leadership. A vCISO prioritizes investments based on actual risk, not the latest vendor pitch or last quarter's audit panic.

You Cannot Justify a Full-Time CISO

A qualified CISO is a six-figure executive hire plus benefits, equity, and professional development. Organizations with 50 to 500 employees typically cannot defend that cost yet still need the security leadership function. A vCISO retainer delivers the same expertise scaled to your real workload, on a custom-quoted monthly fee. Call (919) 348-4912 or schedule a discovery call - we size the engagement to your environment, then quote a flat monthly fee.

Why Petronella

Credentials, Track Record, and Implementation Muscle

A vCISO is only as useful as the credentials they carry, the years they have spent running programs, and the team they bring to implementation.

RPO-1449 Verified

Petronella Technology Group is a CMMC-AB Registered Provider Organization (RPO-1449), verified at cyberab.org. Our entire engineering bench is CMMC-RP certified. Founder Craig Petronella holds CMMC-RP, CCNA, and CWNE credentials plus DFE #604180. Blake Rea, Justin Summers, and Jonathan Wood are CMMC-RP.

23 Years in Raleigh

We started Petronella in 2002 in Raleigh, North Carolina, and we have never relocated. Our office is at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. The relationships we have built across the Triangle, Research Triangle Park, Fort Liberty, and the broader NC defense and healthcare community are not transactional.

BBB A+ Since 2003

Accredited by the Better Business Bureau with an A+ rating since 2003. Twenty-two years of on-time delivery and clean billing. We do not name clients in marketing copy without written consent. Ask during a scoping call and we will arrange a reference call with a current vCISO client matched to your industry.

Strategy and Execution Under One Roof

Most vCISO firms stop at advisory: they write the policies, point at the gaps, and walk away. We have a full managed cybersecurity team, a managed IT services team, and 24/7 SOC analysts on staff. When the vCISO recommends a SIEM consolidation, our team can execute. No finger-pointing across vendors when the audit asks who owns control AC-2.

A vCISO who only writes policies is not a CISO, they are a consultant. Our vCISO service includes the strategic leadership, compliance management, and hands-on technical oversight that a real CISO provides, backed by a full team that can implement the recommendations.

Craig Petronella leads Petronella Technology Group's vCISO practice with 23-plus years of experience in cybersecurity, compliance, and IT leadership. We have served as vCISO for healthcare organizations, defense contractors, engineering firms, financial services firms, SaaS companies, and growing businesses across the Triangle and beyond. Read more about defense contractor, healthcare, and engineering firm security work.

CMMC-RP (Full Team) CMMC-AB RPO-1449 CCNA CWNE DFE #604180 BBB A+ Since 2003
FAQ

Frequently Asked Questions

How much does a virtual CISO cost?

Pricing is scope-based. Call (919) 348-4912 or schedule a 30-minute discovery call to start.

We size the engagement to your framework count, team size, audit cadence, and incident response coverage, then quote a flat monthly fee. No surprise hourly bills.

The four engagement tiers (Starter, Standard, Plus, Enterprise) define the cadence shape - quarterly async, monthly call, bi-weekly with IR coordination, or embedded part-time - and the minimum-term commitment that lets the work compound. Compared to the all-in cost of a full-time CISO including salary, benefits, and equity, a custom-scoped vCISO retainer is a fraction of the price for the same governance function.

What is the contract length?

Starter tier carries a 6-month minimum. Standard and Plus carry 12-month minimums. Enterprise carries a 24-month minimum. Lock-in matters because vCISO advisory effectiveness compounds at month three and beyond, once the advisor knows your business, your team, and your audit cycle. Cancellation requires 30-day written notice. We do not refund unused time within the lock-in.

How much of a vCISO's time do we get?

Engagement models vary from approximately 5 hours per month on Starter to 40-plus hours per month on Enterprise. We scale time allocation based on your needs, more during compliance assessments and incident response, less during steady-state operations. You get a named vCISO who knows your business, not a rotating cast of consultants.

What happens if my scope changes mid-engagement?

You upgrade or downgrade tiers at the next billing cycle. If you start at Starter and pick up a second framework at month four, we move you to Standard at month five. We do not penalize tier moves and we do not nickel-and-dime per framework. We require 30-day notice for downgrades; the lock-in resets to the new tier's minimum on upgrade.

Can a vCISO satisfy compliance requirements for a named security officer?

Yes. HIPAA requires a Security Officer at 45 CFR 164.308(a)(2). CMMC requires a senior official to authorize system operation.

SOC 2 requires defined security roles. PCI DSS requires assigned responsibility. A Petronella vCISO fulfills all of those named-person requirements.

We provide formal designation documentation that lists the named vCISO, scope of authority, and reporting relationship. Auditors and C3PAOs accept this routinely. If you also need the underlying documentation set, pair the vCISO with our DFY HIPAA package or the matching CMMC package so the security officer has the artifacts to govern.

What is the difference between a vCISO and a security consultant?

A consultant delivers a project, an assessment, a policy set, an implementation, and leaves. A vCISO is an ongoing member of your leadership team who manages your security program continuously. They attend meetings, respond to incidents, manage vendor relationships, and evolve your security posture over time. The vCISO model provides continuity that project-based consulting cannot.

Do we still need internal IT staff with a vCISO?

That depends on your size. Many organizations pair a vCISO with our managed IT services for both security leadership and day-to-day IT operations. Larger organizations may have internal IT staff with the vCISO providing security-specific leadership that the IT team lacks. The vCISO is the role that translates your tooling investment into auditable, defensible posture.

Will my auditor or assessor recognize the vCISO designation?

Yes. HIPAA requires a Security Officer (45 CFR 164.308(a)(2)). CMMC requires a senior official to authorize system operation.

SOC 2 requires defined security roles. PCI DSS requires assigned responsibility. Our vCISO fulfills all named-person requirements.

We provide formal designation documentation that auditors and C3PAOs accept routinely. If you have a specific assessor with unusual requirements, send the requirement during scoping and we will confirm fit before contract signing.

Get Started

Get Security Leadership Without the Executive Salary

Schedule a free 30-minute scoping call. We respond within one business day with a calendar invite, an intake form, and a tier recommendation. Already know your tier? Ask for a written engagement letter during the call. We can have a contract on your desk inside three business days, and onboarding starts the following Monday.

vCISO for MSPs - Resell Under Your Brand

Regional MSPs whose clients are asking for a named security officer but who cannot staff one internally rent Petronella's vCISO capability through our partner program. Review the MSP partner program pricing tiers or walk through how Petronella onboards partner MSPs for the MSA and SOW paperwork flow.

Hear from our clients

Carl Anderson testimonial

"Top qualities: Great Results, Expert, High Integrity. I have seen Craig grow his business from when he first started with us as our IT Consultant. He is great person all around. Easy to work with, very conscientious on his work, and always willing to help. He has worked extremely hard and I'm glad to see the rewards of his hard work with his company expanding and thriving. His Top qualities are: Great Results, Expert, High Integrity."

Carl Anderson Fred Anderson Toyota Raleigh, NC
Jaimin Anandjiwala testimonial

"I would recommend him to any client who is looking for any IT help for their organization. I have worked with Craig with the implementation of EMR (Electronic Medical Records) in the Durham area. He is extremely professional and very knowledgable with the current technologies. He ensured that we never had any issues with the IT infrastructure at the practice and that was one of the primary reasons that the implementation went smoothly. He scored high points with his client and us with his professionalism and knowledge and I would recommend him to any client who is looking for any IT help for their organization."

Jaimin Anandjiwala Director of Enterprise Business Division eClinicalWorks EMR
Joel Perrego testimonial

"Craig is very insightful and has the experience and expertise to fix any IT Support issue your company may run into."

Web Design and Marketing Agency in Raleigh, NC
Preston Development testimonial

"Petronella Technology Group, Inc. is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. We have been working with Craig and his team for more than 16 years for all of our company's computer, network and IT Support needs in-house as well as for off-site offices. Everyone at Petronella Technology Group, Inc. is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. Our confidence level has allowed us to recommend Petronella Technology Group, Inc. to long-time business partners and associates."

Construction Company in Cary, NC
Marshalls Locksmith testimonial

"We appreciated the quick response time and excellent follow-up. We recommend them very highly. We are extremely pleased with Petronella Technology Group, Inc. Our experiences working with Craig have always been excellent. You and your firm are able to diagnose and correct the problems very quickly and professionally. We appreciated the quick response time and excellent follow-up. We recommend them very highly."

Locksmith Service Company in Raleigh, NC
Roglieri Sales Training testimonial

"Craig is an absolute professional and a great pleasure to work with. would highly recommend Petronella Technology Group, Inc. and constantly receive positive feedback on Craig and his company."

Sales Training in Raleigh, NC
Nicholas Smith testimonial

"Craig is a wonderful partner who follows through with great service and good value. Craig is a wonderful partner who follows through with great service and good value. His knowledge of systems sets him apart from anybody else."

Nicholas Smith Southeastern Managing Director Winmark Capital