Intelligence in vCISO

Cyber Intelligence Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
Understanding PCI DSS Compliance: Penetration Testing, Quarterly Scanning, QSA, and SAQ Guidance 
Understanding PCI DSS Compliance: Penetration Testing, Quarterly Scanning, QSA, and SAQ Guidance 
Learn the essentials of PCI DSS compliance, including penetration testing, quarterly vulnerability scanning, and the role of QSAs and SAQs. Stay ahead of cyber threats and ensure secure payment transactions. Contact Echelon Risk + Cyber to streamline your compliance strategy. 
Posted on Apr 15 / 2025
How Montauk Renewables Slashed Cyber Risk by 90%—And How You Can Too  
How Montauk Renewables Slashed Cyber Risk by 90%—And How You Can Too  
Montauk Renewables reduced critical vulnerabilities by 90% with Echelon’s vCISO and Security Team as a Service. Through a structured 12-month cybersecurity roadmap, we helped Montauk enhance IT-OT security, meet SEC compliance, and shift from reactive firefighting to strategic cybersecurity execution. Download the full case study to see how we transformed their security posture. 
Posted on Mar 14 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization. 
Posted on Mar 04 / 2025
Cybersecurity Strategies for High-Growth Software Startups
Cybersecurity Strategies for High-Growth Software Startups
Discover how Echelon's vCISO services can help high-growth software startups overcome cybersecurity challenges. Build scalable strategies to protect customer data, meet compliance, and stay ahead of threats without slowing innovation. Learn more today! 
Posted on Feb 05 / 2025
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
We’re excited to share the 5 most-read articles of the year. These articles stand out for their relevance, depth, and impact on the ongoing cybersecurity dialogue. Whether you’re a seasoned pro or just starting to dive into the world of cybersecurity, these pieces offer valuable perspectives on the challenges and solutions facing today’s digital landscape.
Posted on Dec 18 / 2024
Protecting K-12 Schools: Tackling Top Cyber Risks with FCC's $200M Cybersecurity Pilot Program
Protecting K-12 Schools: Tackling Top Cyber Risks with FCC's $200M Cybersecurity Pilot Program
Earlier this year, the Federal Communications Commission (FCC) announced $200 million worth of cybersecurity grants will be distributed to eligible K-12 schools as part of the Cybersecurity Pilot Program. So, what are the biggest cyber risks to schools, and how can schools mitigate them in the most cost-efficient way?
Posted on Dec 11 / 2024
Roundtable: Beyond Checkboxes - Navigating Compliance and Security
Roundtable: Beyond Checkboxes - Navigating Compliance and Security
Explore the crucial differences between compliance and security in this insightful roundtable with Echelon’s Paul Interval and A-LIGN’s Blaise Wabo. Learn how to move beyond checkboxes, address risks, and implement forward-thinking strategies to protect your organization.
Posted on Dec 05 / 2024
Comprehensive Guide: Mastering Third-Party Risk Management
Comprehensive Guide: Mastering Third-Party Risk Management
In today's interconnected world, Third-Party Risk Management (TPRM) is essential for safeguarding your organization against cyber threats introduced by external partners. This guide explores the critical aspects of TPRM, providing a framework for identifying, assessing, and mitigating risks associated with third-party relationships. 
Posted on Oct 16 / 2024
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Discover expert strategies from Echelon to enhance your organization's cybersecurity during Cybersecurity Awareness Month. Learn about training enhancements, cyber exercise benefits, internal testing, and building a culture of awareness to strengthen cyber defenses. 
Posted on Oct 01 / 2024
Comprehensive Guide: Maximizing Cybersecurity with vCISO-Led Security Teams
Comprehensive Guide: Maximizing Cybersecurity with vCISO-Led Security Teams
Written by Echelon’s Cybersecurity Associate, John Hurd, our guide, "Maximizing Cybersecurity with vCISO-Led Security Teams" dives deep into the potential pitfalls and offers strategic insights to help you safeguard your organization.
Posted on Sep 11 / 2024
The Business Case for Investing in Cybersecurity Compliance
The Business Case for Investing in Cybersecurity Compliance
The idea that cybersecurity compliance is a financial obstacle is a dangerous misconception. Having robust cybersecurity compliance is more than just checking the box on compliance. It is a strategic investment that can create significant returns for any organization, but for the investment to be successful, they must commit time and resources to it. Organizations that view compliance as an opportunity rather than just a box they must check, will have a competitive advantage against competitors. Customers are more likely to trust and engage with businesses that prioritize their data and privacy. Trust can then lead to increased customer acquisition and retention for any organization.  
Posted on Aug 14 / 2024
CISOs, Are You Doing Enough to Evaluate and Address Your Vendor Risk?
CISOs, Are You Doing Enough to Evaluate and Address Your Vendor Risk?
Is your organization's Vendor Risk Management strategy robust enough? This article explores the critical role of CISOs in assessing new vendors and monitoring existing ones to safeguard against data breaches and potential disruptions. Stay ahead in the evolving landscape of third-party threats and enhance your cybersecurity posture.
Posted on Dec 15 / 2023
The CISO’s Guide to Ramping Up Cybersecurity During the Holidays: 7 Essential Steps for Incident Preparedness
The CISO’s Guide to Ramping Up Cybersecurity During the Holidays: 7 Essential Steps for Incident Preparedness
Discover 7 essential steps for CISOs to bolster cybersecurity during the holiday season. Learn how to recognize and prepare for heightened cyber threats, including data-backed insights and attack-specific playbooks.
Posted on Dec 14 / 2023
To hire, or not to hire a CISO? That is the question. Or is it though?
To hire, or not to hire a CISO? That is the question. Or is it though?
Small to mid-sized businesses often wonder whether to hire a Chief Information Security Officer (CISO). This article examines the factors for SMBs to consider when deciding to hire a full-time or fractional CISO.
Posted on May 04 / 2023
Practical Strategies to Enhance Your Organization’s Information Security Awareness and Training Program
Practical Strategies to Enhance Your Organization’s Information Security Awareness and Training Program
When it comes to cybersecurity, all organizations share a similar risk – the possibility of human error. When it comes to educating your people about cyber, one size does NOT fit all. Here are six strategies to mature your information security awareness and training program.
Posted on Feb 09 / 2023
Are Your Vendors “Tall enough to Ride the Ride”?
Are Your Vendors “Tall enough to Ride the Ride”?
We can think about an amusement park’s rider height and restriction requirements as a useful way to describe risk tolerances when onboarding new vendors or increasing scopes of work to existing ones.
Posted on Aug 22 / 2022
Postcard from the 2022 PA Bankers Convention
Postcard from the 2022 PA Bankers Convention
Upon returning home from Scottsdale, AZ for the PA Bankers Convention of 2022, I had some time to reflect on my three key takeaways from my time spent amongst leaders in the great banking industry of Pennsylvania.
Posted on May 29 / 2022
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
The Lapsus$ attacks have helped companies realize that third-party vendors can be the 'weakest link' within their own organizations. This article summarizes what companies can learn (and do) to protect data.

Posted on Apr 11 / 2022
Looking Inward, Charting a New Course for Effective TPRM
Looking Inward, Charting a New Course for Effective TPRM
Most current third-party risk management (TPRM) programs are external-facing. But what if the greatest threat to your organization wasn’t external?
Posted on Apr 06 / 2022
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
The year 2021 brought about some serious cyber challenges. This article summarizes key takeaways from CrowdStrike's Global Threat Landscape report, provides a breakdown of the five 2021 themes, and gives our take on seven recommendations that resonate most with us.
Posted on Apr 01 / 2022
The Countdown Begins for Financial Institutions Using FedLine Solutions
The Countdown Begins for Financial Institutions Using FedLine Solutions
In January 2021, the Federal Reserve Banks implemented the Security and Resiliency Assurance Program outlining new compliance requirements for banks that use FedLine® by the end of 2022. This article outlines everything you need to know about this new program.
Posted on Mar 23 / 2022
Maturing Your IAM Program: Role-Based Access Control (RBAC)
Maturing Your IAM Program: Role-Based Access Control (RBAC)
Role Based Access Control (RBAC) has become the holy grail of access management. What does RBAC stand for? Here are a few tips on how to strategically approach your RBAC adoption journey.
Posted on Mar 16 / 2022
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
Lawmakers have argued about mandatory cyber incident reporting for years, but it has never gained the traction needed to become widespread law. For those in the banking industry, this is all about to change.
Posted on Mar 02 / 2022
Top 7 Cybersecurity Predictions for 2022
Top 7 Cybersecurity Predictions for 2022
As 2021 winds down, we take a peek into the future of cybersecurity for 2022. Will our predictions come true?
Posted on Dec 14 / 2021
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
As technology advances at an unprecedented pace, many businesses are aggressively accelerating adoption to maintain a competitive advantage. But there’s a big risk for those who don’t keep cybersecurity top of mind.
Posted on Nov 10 / 2021
Are you ready to get started?