Virtual CISOServices
A full-time Chief Information Security Officer is a six-figure hire most small and mid-size businesses cannot justify, but they still need strategic security leadership. Petronella Technology Group provides virtual CISO retainers scoped to your environment, with named CMMC-Registered Practitioners and a full implementation team behind every recommendation. Pricing is custom-quoted to your framework count, team size, and risk posture - call (919) 348-4912 or schedule a 30-minute discovery call.
Why Your Business Needs Security Leadership
Cybersecurity is no longer just an IT problem. It is a board-level risk that demands strategic ownership. Buyers, regulators, primes, insurers, and customers expect a named security executive who can articulate the company's risk posture in plain English, run the compliance program, sign off on incident response, and translate every dollar of security spend into measurable risk reduction.
Without that role, three things happen. Security decisions default to the IT team, who are paid to keep systems running rather than to manage risk. Spending becomes reactive: a breach, an insurer demand, a failed pen test, then a panic purchase of yet another tool. And when the inevitable security questionnaire arrives from an enterprise buyer, no one is qualified to fill it out, so the deal stalls or vanishes.
Hiring a full-time CISO solves the problem at the wrong price. A qualified candidate with CISSP, CISM, or equivalent credentials, plus three to five years in your vertical, is a six-figure hire that takes six to nine months to close. You also need to give them a budget, a team, and time to build the program. Most mid-market companies do not have that runway.
The virtual CISO model collapses the timeline. We embed an experienced security leader at the cadence you need, anywhere from a few hours a month for a small team on a single framework, up to a part-time embedded executive carrying multiple programs.
The retainer is fixed for the term you select. Deliverables are scheduled. Board memos arrive on time. When something explodes, your retainer absorbs the response instead of triggering a change order.
Pricing is scoped to your environment. We size the engagement to your framework count, team size, and risk posture, then quote a flat monthly fee. No surprise hourly bills. Call (919) 348-4912 or schedule a discovery call to start.
Virtual CISO Responsibilities
Everything a full-time CISO would do, scaled to your business size and budget. The vCISO model is also called fractional CISO, outsourced CISO, ciso as a service, and part-time CISO; the function is the same.
Strategic Leadership
- Develop and maintain the information security program
- Present security posture and risk to board and leadership
- Align security investments with business priorities
- Vendor risk management and security questionnaires
- Security budget planning and ROI analysis
Operational Oversight
- Compliance program management for CMMC L1, L2, and L3, HIPAA, NIST 800-53, NIST CSF 2.0, SOC 2, ISO 27001, DFARS, and PCI DSS, paired with our productized ComplianceArmor SKUs when you need flat-fee documentation
- Security policy development and maintenance
- Incident response planning and coordination
- Security awareness training program oversight (annual SAT for the whole workforce)
- Risk assessment and vulnerability management
Four vCISO Engagement Tiers
Pick the engagement shape that matches your obligation, then call us for a custom quote. Every tier is a fixed monthly retainer with a published minimum-term commitment so the work compounds. No hourly billing, no surprise invoices, no scope-creep. Hours that do not roll forward bank for 30 days, then expire.
Starter
Engagement Cadence- Approximately 5 hours per month of senior advisory time
- Quarterly written board memo
- Async monthly posture review
- Written gap-remediation roadmap
- One primary framework (CMMC L2, HIPAA, NIST CSF 2.0, or SOC 2)
- Policy library access and templates
For small teams with one active compliance obligation, recently received a flow-down clause, or stepping out of a Gap Analysis into ongoing leadership. Call for a custom quote.
Standard
Engagement Cadence- Approximately 15 hours per month, monthly cadence call
- Monthly executive risk dashboard
- Up to 4 vendor risk reviews per year
- Annual tabletop exercise with written report
- Two primary frameworks running together
- Annual penetration test coordination and remediation
- Incident response runbook maintained quarterly
Most active vCISO clients sit here. Right when you carry obligations to two stakeholders or your board has cyber as a quarterly agenda item. Call for a custom quote.
Plus
Engagement Cadence- Approximately 30 hours per month, bi-weekly cadence
- 4-hour incident response coordination SLA
- Quarterly board attendance, not memo-only
- Semi-annual tabletop exercises
- Three primary frameworks in parallel
- Unlimited vendor risk reviews
- Co-signed regulatory submissions where permitted
- Two penetration tests coordinated per year
For companies with material exposure, multi-site SOC 2, ePHI in volume, or CUI on multiple contracts. Bridge-CISO during a 9-12 month executive search. Call for a custom quote.
Enterprise
Engagement Cadence- Custom-scoped embedded part-time CISO
- Named individual on senior leadership roster
- On-site availability and continuous responsiveness
- Unlimited frameworks and multi-site governance
- M&A diligence and PE due-diligence cyber lead
- Direct co-leadership of internal IT or security teams
PE-backed, multi-site, or three-plus frameworks at once. Companies that should hire a CISO but cannot wait six to nine months for the search. Call for a custom quote.
Pricing is scoped to your environment. Actual retainer is confirmed during a free scoping call based on framework count, headcount, audit cadence, and incident response coverage. We quote a flat monthly fee with no surprise hourly bills.
Cancellation requires 30-day written notice. We do not refund unused time within the agreed minimum term. You can upgrade tiers at the next billing cycle without penalty; the minimum term resets to the new tier on upgrade.
Pair any tier with our productized ComplianceArmor offers for documentation deliverables to compress your time-to-audit-ready by months. Call (919) 348-4912 or schedule a 30-minute discovery call to scope your engagement.
Compliance Frameworks the vCISO Runs
A vCISO is only as useful as the frameworks they actually know. Our team has walked clients through every framework below in the past 23 years.
CMMC L1, L2, and L3. We consult on all three Cybersecurity Maturity Model Certification levels. Level 1: Federal Contract Information, 17 basic safeguarding requirements, annual self-attestation.
Level 2: Controlled Unclassified Information, the 110 controls of NIST SP 800-171 Rev 2, third-party C3PAO assessment for prioritized acquisitions. Level 3: higher-risk CUI with controls from NIST SP 800-172 plus L2, government-led DIBCAC assessment.
Pair the vCISO retainer with our CMMC L2 readiness package for SSP authoring, POAM remediation, and evidence binder construction.
HIPAA Security Rule. The HIPAA Security Rule at 45 CFR Part 164 requires a Risk Analysis under 45 CFR 164.308(a)(1)(ii)(A) plus 18 standards across administrative, physical, and technical safeguards. We have walked covered entities, business associates, and SaaS-vendor BAA subcontractors through Risk Analysis cycles.
There is no HHS-issued HIPAA certification. Our work aligns documentation to NIST SP 800-66 Rev 2 and the HHS Office for Civil Rights audit protocol. Self-attestation only. We never claim certification authority we do not hold.
NIST SP 800-53 Rev 5 and NIST CSF 2.0. NIST SP 800-53 Rev 5 covers 20 control families across more than a thousand individual controls and enhancements. NIST Cybersecurity Framework 2.0 was released in February 2024 and added a sixth function (GOVERN) to the original five (IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER).
For state agencies, regional governments, and commercial enterprises that want a maturity model rather than a hard regulatory mandate, CSF 2.0 is usually the right entry point.
SOC 2 Type I and Type II. The AICPA SOC 2 framework covers five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy. Most SaaS buyers ask for Type I to start, then Type II once you have six to twelve months of evidence.
Our vCISOs handle auditor liaison, evidence collection, and control mapping. Pair the retainer with our productized SOC 2 Type I package for both documentation and program management. The CPA fee for the actual audit is paid separately to a third-party auditor and varies by auditor and scope; we coordinate auditor selection during the engagement.
ISO 27001:2022, DFARS, and PCI DSS. ISO/IEC 27001:2022 is the international standard for Information Security Management Systems with 93 Annex A controls under four themes. DFARS 252.204-7012 covers safeguarding of covered defense information; DFARS 252.204-7019 requires a current NIST SP 800-171 self-assessment posted to the Supplier Performance Risk System.
PCI DSS v4.0.1 covers 12 control areas across cardholder data environments. We also routinely work with CCPA, state privacy laws, CJIS Security Policy, GDPR, FedRAMP Moderate, and FERPA.
What a vCISO Engagement Actually Looks Like
The first 90 days set the cadence for the rest of the engagement. Here is what to expect, regardless of tier.
Days 1 to 7: discovery and onboarding. You receive a written engagement letter with the tier you selected, the named vCISO assigned to your account, the lock-in term, the cadence calendar, and the secure document portal credentials.
We start an inventory of your current security posture: existing policies, last audit reports, current control implementations, vendor list with BAAs and MSAs, incident history if any. The first week also includes a kickoff call with the executive sponsor and the working sponsor, typically your IT director or operations lead.
Days 8 to 30: baseline and roadmap. We deliver a written current-state assessment within 30 days. It maps your existing controls to whatever framework you carry, identifies gaps with priority ranking, and produces a 90 to 180 day remediation roadmap.
The roadmap is written for the executive reader, not a control-level checklist. The assessment is honest. If you have spent a year telling your board you are 80 percent ready for SOC 2 and the truth is closer to 45 percent, the assessment says 45 percent. We do not deliver a sugar-coated baseline.
Days 30 to 60: first execution cycle. We begin executing the highest-priority gap remediation work alongside your team. Depending on your tier, we run monthly or bi-weekly cadence calls.
We start the policy refresh cycle and open the vendor risk review queue. If you carry HIPAA, we start the Risk Analysis. If you carry CMMC L2, we begin the SSP and POAM build. If you carry SOC 2, we open the control matrix and start gathering evidence in your secure document portal.
Days 60 to 90: first board memo and program rhythm. Your first quarterly board memo lands at day 75 to 90. Two pages, executive summary on top, plain English. We attend the board meeting on Plus and Enterprise tiers, or stand by for questions during the agenda item on Standard.
The cadence is now established: monthly review call, quarterly written memo, semi-annual tabletop on Plus and Enterprise, annual program refresh, continuous vendor risk and incident readiness.
Steady state: months four onward. The work shifts toward continuous monitoring, audit prep when assessment cycles arrive, vendor risk review on every new contract, incident response coordination if an event occurs, and ongoing executive education.
The first time your auditor or assessor walks in, the program is already audit-ready. Evidence is collected, policies are signed, artifacts are versioned, and gaps are documented in a current POAM. We run through the audit prep with you twice before the assessor arrives. Surprises during the assessment are rare and recoverable. That predictability is what the retainer pays for.
Signs Your Organization Needs a Virtual CISO
You Have Compliance Requirements
HIPAA, CMMC, SOC 2, PCI DSS, NIST 800-53, ISO 27001, and other frameworks require a documented security program with named accountability. A vCISO provides the security leadership that auditors, C3PAOs, and assessors expect to see, without the cost of a full-time executive.
You Are Losing Enterprise Deals
Enterprise customers send security questionnaires before signing contracts. Without a CISO to manage these assessments and demonstrate a mature security program, you lose deals to competitors who can. A vCISO turns security into a competitive advantage instead of a procurement blocker.
Your Security Spending Is Reactive
If you buy security tools only after incidents or auditor findings, you are spending more and getting less than organizations with strategic security leadership. A vCISO prioritizes investments based on actual risk, not the latest vendor pitch or last quarter's audit panic.
You Cannot Justify a Full-Time CISO
A qualified CISO is a six-figure executive hire plus benefits, equity, and professional development. Organizations with 50 to 500 employees typically cannot defend that cost yet still need the security leadership function. A vCISO retainer delivers the same expertise scaled to your real workload, on a custom-quoted monthly fee. Call (919) 348-4912 or schedule a discovery call - we size the engagement to your environment, then quote a flat monthly fee.
Credentials, Track Record, and Implementation Muscle
A vCISO is only as useful as the credentials they carry, the years they have spent running programs, and the team they bring to implementation.
RPO-1449 Verified
Petronella Technology Group is a CMMC-AB Registered Provider Organization (RPO-1449), verified at cyberab.org. Our entire engineering bench is CMMC-RP certified. Founder Craig Petronella holds CMMC-RP, CCNA, and CWNE credentials plus DFE #604180. Blake Rea, Justin Summers, and Jonathan Wood are CMMC-RP.
23 Years in Raleigh
We started Petronella in 2002 in Raleigh, North Carolina, and we have never relocated. Our office is at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. The relationships we have built across the Triangle, Research Triangle Park, Fort Liberty, and the broader NC defense and healthcare community are not transactional.
BBB A+ Since 2003
Accredited by the Better Business Bureau with an A+ rating since 2003. Twenty-two years of on-time delivery and clean billing. We do not name clients in marketing copy without written consent. Ask during a scoping call and we will arrange a reference call with a current vCISO client matched to your industry.
Strategy and Execution Under One Roof
Most vCISO firms stop at advisory: they write the policies, point at the gaps, and walk away. We have a full managed cybersecurity team, a managed IT services team, and 24/7 SOC analysts on staff. When the vCISO recommends a SIEM consolidation, our team can execute. No finger-pointing across vendors when the audit asks who owns control AC-2.
A vCISO who only writes policies is not a CISO, they are a consultant. Our vCISO service includes the strategic leadership, compliance management, and hands-on technical oversight that a real CISO provides, backed by a full team that can implement the recommendations.
Craig Petronella leads Petronella Technology Group's vCISO practice with 23-plus years of experience in cybersecurity, compliance, and IT leadership. We have served as vCISO for healthcare organizations, defense contractors, engineering firms, financial services firms, SaaS companies, and growing businesses across the Triangle and beyond. Read more about defense contractor, healthcare, and engineering firm security work.
Frequently Asked Questions
How much does a virtual CISO cost?
Pricing is scope-based. Call (919) 348-4912 or schedule a 30-minute discovery call to start.
We size the engagement to your framework count, team size, audit cadence, and incident response coverage, then quote a flat monthly fee. No surprise hourly bills.
The four engagement tiers (Starter, Standard, Plus, Enterprise) define the cadence shape - quarterly async, monthly call, bi-weekly with IR coordination, or embedded part-time - and the minimum-term commitment that lets the work compound. Compared to the all-in cost of a full-time CISO including salary, benefits, and equity, a custom-scoped vCISO retainer is a fraction of the price for the same governance function.
What is the contract length?
Starter tier carries a 6-month minimum. Standard and Plus carry 12-month minimums. Enterprise carries a 24-month minimum. Lock-in matters because vCISO advisory effectiveness compounds at month three and beyond, once the advisor knows your business, your team, and your audit cycle. Cancellation requires 30-day written notice. We do not refund unused time within the lock-in.
How much of a vCISO's time do we get?
Engagement models vary from approximately 5 hours per month on Starter to 40-plus hours per month on Enterprise. We scale time allocation based on your needs, more during compliance assessments and incident response, less during steady-state operations. You get a named vCISO who knows your business, not a rotating cast of consultants.
What happens if my scope changes mid-engagement?
You upgrade or downgrade tiers at the next billing cycle. If you start at Starter and pick up a second framework at month four, we move you to Standard at month five. We do not penalize tier moves and we do not nickel-and-dime per framework. We require 30-day notice for downgrades; the lock-in resets to the new tier's minimum on upgrade.
Can a vCISO satisfy compliance requirements for a named security officer?
Yes. HIPAA requires a Security Officer at 45 CFR 164.308(a)(2). CMMC requires a senior official to authorize system operation.
SOC 2 requires defined security roles. PCI DSS requires assigned responsibility. A Petronella vCISO fulfills all of those named-person requirements.
We provide formal designation documentation that lists the named vCISO, scope of authority, and reporting relationship. Auditors and C3PAOs accept this routinely. If you also need the underlying documentation set, pair the vCISO with our DFY HIPAA package or the matching CMMC package so the security officer has the artifacts to govern.
What is the difference between a vCISO and a security consultant?
A consultant delivers a project, an assessment, a policy set, an implementation, and leaves. A vCISO is an ongoing member of your leadership team who manages your security program continuously. They attend meetings, respond to incidents, manage vendor relationships, and evolve your security posture over time. The vCISO model provides continuity that project-based consulting cannot.
Do we still need internal IT staff with a vCISO?
That depends on your size. Many organizations pair a vCISO with our managed IT services for both security leadership and day-to-day IT operations. Larger organizations may have internal IT staff with the vCISO providing security-specific leadership that the IT team lacks. The vCISO is the role that translates your tooling investment into auditable, defensible posture.
Will my auditor or assessor recognize the vCISO designation?
Yes. HIPAA requires a Security Officer (45 CFR 164.308(a)(2)). CMMC requires a senior official to authorize system operation.
SOC 2 requires defined security roles. PCI DSS requires assigned responsibility. Our vCISO fulfills all named-person requirements.
We provide formal designation documentation that auditors and C3PAOs accept routinely. If you have a specific assessor with unusual requirements, send the requirement during scoping and we will confirm fit before contract signing.
Explore More
Get Security Leadership Without the Executive Salary
Schedule a free 30-minute scoping call. We respond within one business day with a calendar invite, an intake form, and a tier recommendation. Already know your tier? Ask for a written engagement letter during the call. We can have a contract on your desk inside three business days, and onboarding starts the following Monday.
vCISO for MSPs - Resell Under Your Brand
Regional MSPs whose clients are asking for a named security officer but who cannot staff one internally rent Petronella's vCISO capability through our partner program. Review the MSP partner program pricing tiers or walk through how Petronella onboards partner MSPs for the MSA and SOW paperwork flow.