Intelligence in vCISO

Cyber Intelligence Weekly
Join Echelon’s 31K+ subscribers and stay current on cybersecurity trends and insights.
MSPs and CMMC Level 2: Certification Isn’t Always Required—But It Might Be
MSPs and CMMC Level 2: Certification Isn’t Always Required—But It Might Be
Do MSPs need CMMC Level 2 certification? The answer depends on how the MSP interacts with CUI. This article breaks down when MSPs are in scope, what types of access trigger compliance, and how organizations can address CMMC risk early.
Posted on Jan 15 / 2026
Section C: Assessments
Section C: Assessments
CMMC 2.0 assessments are more than a one-time audit. Learn how often assessments are required, POA&M rules, SPRS issues, and how to stay compliant.
Posted on Jan 05 / 2026
Section B: CMMC Model
Section B: CMMC Model
Confused about how CMMC levels are determined for DoD contracts? Learn more about the CMMC Model, Level 2 requirements, and how NIST SP 800-171 revisions impact your certification path.
Posted on Dec 18 / 2025
2025 in Review: Top Cybersecurity Articles You Can’t Miss
2025 in Review: Top Cybersecurity Articles You Can’t Miss
2025 was a defining year for cybersecurity, and this article brings together the insights that mattered most. Inside, you’ll find Echelon’s top reports and articles covering real-world threats, defensive gaps, compliance shifts, and lessons learned across industries. It’s a guided entry point into the stories and strategies worth revisiting as you plan what comes next.
Posted on Dec 17 / 2025
Section A: About CMMC
Section A: About CMMC
CMMC 2.0 requirements are officially rolling out, and defense contractors must act now to stay contract-eligible. This first section of our CMMC FAQs breaks down key timelines, costs, assessments, and official DoD resources, giving you clear, authoritative guidance to prepare for compliance with confidence.
Posted on Dec 15 / 2025
CMMC 2.0: Navigating a Comprehensive Guide for Defense Contractors
CMMC 2.0: Navigating a Comprehensive Guide for Defense Contractors
CMMC 2.0 introduces new requirements for defense contractors. This guide explains what it is, the differences from CMMC 1.0, and step-by-step strategies for planning, assessing, and preparing for certification.
Posted on Dec 03 / 2025
CMMC 2.0: Gap Assessment vs. Pre-Audit Assessment
CMMC 2.0: Gap Assessment vs. Pre-Audit Assessment
Preparing for CMMC 2.0 certification isn’t just about checking boxes it’s about timing and strategy. Learn how Gap Assessments and Pre-Audit Assessments work together to uncover weaknesses, validate controls, and ensure your organization is truly audit-ready.
Posted on Dec 03 / 2025
How to Get Round-the-Clock Threat Detection Without Adding Headcount or Burning Out Your Team
How to Get Round-the-Clock Threat Detection Without Adding Headcount or Burning Out Your Team
Protect your business 24/7 without adding headcount or burning out your team. Learn how MDR, SOC-as-a-Service, and co-managed SIEM deliver always-on threat detection while keeping costs and complexity under control.
Posted on Oct 30 / 2025
Six Steps to Building an Effective Cybersecurity Risk Management Program 
Six Steps to Building an Effective Cybersecurity Risk Management Program 
CISOs and IT leaders face growing pressure to prove cyber risk maturity. This guide breaks down six actionable steps to build a scalable, compliant, and board-ready risk management program.
Posted on Oct 28 / 2025
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
Critical Misconfiguration: M365 Direct Send Exposes Tenants to Untraceable Internal Phishing
A critical Microsoft 365 misconfiguration is enabling untraceable internal phishing. Learn how Echelon’s experts uncovered the issue and how to fix it fast.
Posted on Oct 23 / 2025
How to Relieve Overloaded IT Teams with Managed Cybersecurity Support
How to Relieve Overloaded IT Teams with Managed Cybersecurity Support
IT and security teams are stretched thin, juggling daily operations, compliance, and cyber threats. Learn how managed cybersecurity support helps reduce burnout, streamline audits, and shift from reactive firefighting to proactive protection.
Posted on Oct 15 / 2025
Cybersecurity and Compliance in Financial Services: Protecting Banks, Asset Managers, and Fintechs
Cybersecurity and Compliance in Financial Services: Protecting Banks, Asset Managers, and Fintechs
Financial institutions face growing cyber risks and complex regulations like FFIEC, GLBA, and NYDFS. Echelon’s experts explain how banks, asset managers, and fintechs can stay compliant while building stronger cyber resilience.
Posted on Oct 08 / 2025
FedRAMP 20x: What’s Changing, Who It Impacts, and How to Prepare 
FedRAMP 20x: What’s Changing, Who It Impacts, and How to Prepare 
FedRAMP 20x is here. Learn what’s changing, who it impacts, and the steps you should take now to prepare for faster, automated compliance.
Posted on Sep 24 / 2025
Business Continuity: Preparing for Q4 and Beyond
Business Continuity: Preparing for Q4 and Beyond
Prepare for Q4 with a strong business continuity plan. Learn how to manage seasonal risks, prevent costly downtime, and build resilience into the new year.
Posted on Sep 22 / 2025
Texas Cybersecurity Safe Harbor Law (SB 2610): 10 Things Small and Mid-Sized Businesses Must Know Before September 1, 2025
Texas Cybersecurity Safe Harbor Law (SB 2610): 10 Things Small and Mid-Sized Businesses Must Know Before September 1, 2025
On June 20, 2025, Governor Greg Abbott signed the Texas Cybersecurity Safe Harbor Law (SB 2610). This law takes effect on September 1, 2025, and brings major changes for small and mid-sized Texas businesses that handle sensitive personal information.If your organization has fewer than 250 employees, this law could protect you from punitive damages after a data breach—but only if you maintain a documented, compliant cybersecurity program.
Posted on Aug 27 / 2025
Business Continuity Planning for Mid-Sized Organizations: 10 Essential Steps 
Business Continuity Planning for Mid-Sized Organizations: 10 Essential Steps 
Discover how to develop a business continuity plan with this 10-step guide designed to help mid-sized organizations minimize downtime and recover quickly. Learn clear, actionable strategies to boost resilience and protect operations through effective business continuity planning.
Posted on Jul 30 / 2025
Navigating the FFIEC CAT Sunset: What Financial Institutions Need to Know 
Navigating the FFIEC CAT Sunset: What Financial Institutions Need to Know 
The FFIEC Cybersecurity Assessment Tool (CAT) is being sunset, leaving financial institutions in need of new ways to assess cybersecurity risks. Learn why it's being phased out, the top alternative frameworks to adopt, and how to ensure a smooth transition while maintaining compliance and security readiness. 
Posted on Jul 16 / 2025
SOC 2 Type 2: Frequently Asked Questions
SOC 2 Type 2: Frequently Asked Questions
Curious about SOC 2 Type 2? This FAQ guide answers common questions about the audit process, Trust Services Criteria, preparation tips, and how compliance can boost business credibility. 
Posted on Jun 18 / 2025
You Can’t Outsource Risk: Rethinking Third-Party Cybersecurity 
You Can’t Outsource Risk: Rethinking Third-Party Cybersecurity 
Learn how to effectively manage third-party cyber risk with proven strategies and tools. Build trust, reduce exposure, and meet compliance requirements. 
Posted on Jun 10 / 2025
Differences Between ISO 27001 vs SOC 2 Type 2 Audits 
Differences Between ISO 27001 vs SOC 2 Type 2 Audits 
Compare ISO 27001 vs SOC 2 Type 2 audits in this detailed guide. Learn key differences in scope, timelines, frameworks, and compliance use cases to choose the right standard for your organization.
Posted on May 28 / 2025
Navigating the 2024 Updates to ISA/IEC 62443 
Navigating the 2024 Updates to ISA/IEC 62443 
This article outlines the major 2024 updates to the ISA/IEC 62443 standards, focusing on changes to governance, supply chain security, monitoring practices, and workforce training. It highlights how Echelon’s Risk and Audit Assessment services can help organizations in manufacturing and the defense industrial base understand and implement these updates effectively. 
Posted on May 21 / 2025
How the Detroit Pistons Built a Robust Cybersecurity Framework with Echelon 
How the Detroit Pistons Built a Robust Cybersecurity Framework with Echelon 
Discover how the Detroit Pistons partnered with Echelon Risk + Cyber to build a resilient cybersecurity framework. Download the case study to learn how strategic testing, governance, and expert insights reduced critical risks and boosted compliance readiness.
Posted on Apr 24 / 2025
Understanding PCI DSS Compliance: Penetration Testing, Quarterly Scanning, QSA, and SAQ Guidance 
Understanding PCI DSS Compliance: Penetration Testing, Quarterly Scanning, QSA, and SAQ Guidance 
Learn the essentials of PCI DSS compliance, including penetration testing, quarterly vulnerability scanning, and the role of QSAs and SAQs. Stay ahead of cyber threats and ensure secure payment transactions. Contact Echelon Risk + Cyber to streamline your compliance strategy. 
Posted on Apr 15 / 2025
How Montauk Renewables Slashed Cyber Risk by 90%—And How You Can Too  
How Montauk Renewables Slashed Cyber Risk by 90%—And How You Can Too  
Montauk Renewables reduced critical vulnerabilities by 90% with Echelon’s vCISO and Security Team as a Service. Through a structured 12-month cybersecurity roadmap, we helped Montauk enhance IT-OT security, meet SEC compliance, and shift from reactive firefighting to strategic cybersecurity execution. Download the full case study to see how we transformed their security posture. 
Posted on Mar 14 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization. 
Posted on Mar 04 / 2025
Cybersecurity Strategies for High-Growth Software Startups
Cybersecurity Strategies for High-Growth Software Startups
Discover how Echelon's vCISO services can help high-growth software startups overcome cybersecurity challenges. Build scalable strategies to protect customer data, meet compliance, and stay ahead of threats without slowing innovation. Learn more today! 
Posted on Feb 05 / 2025
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
We’re excited to share the 5 most-read articles of the year. These articles stand out for their relevance, depth, and impact on the ongoing cybersecurity dialogue. Whether you’re a seasoned pro or just starting to dive into the world of cybersecurity, these pieces offer valuable perspectives on the challenges and solutions facing today’s digital landscape.
Posted on Dec 18 / 2024
Protecting K-12 Schools: Tackling Top Cyber Risks with FCC's $200M Cybersecurity Pilot Program
Protecting K-12 Schools: Tackling Top Cyber Risks with FCC's $200M Cybersecurity Pilot Program
Earlier this year, the Federal Communications Commission (FCC) announced $200 million worth of cybersecurity grants will be distributed to eligible K-12 schools as part of the Cybersecurity Pilot Program. So, what are the biggest cyber risks to schools, and how can schools mitigate them in the most cost-efficient way?
Posted on Dec 11 / 2024
Roundtable: Beyond Checkboxes - Navigating Compliance and Security
Roundtable: Beyond Checkboxes - Navigating Compliance and Security
Explore the crucial differences between compliance and security in this insightful roundtable with Echelon’s Paul Interval and A-LIGN’s Blaise Wabo. Learn how to move beyond checkboxes, address risks, and implement forward-thinking strategies to protect your organization.
Posted on Dec 05 / 2024
Comprehensive Guide: Mastering Third-Party Risk Management
Comprehensive Guide: Mastering Third-Party Risk Management
In today's interconnected world, Third-Party Risk Management (TPRM) is essential for safeguarding your organization against cyber threats introduced by external partners. This guide explores the critical aspects of TPRM, providing a framework for identifying, assessing, and mitigating risks associated with third-party relationships. 
Posted on Oct 16 / 2024
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection 
Discover expert strategies from Echelon to enhance your organization's cybersecurity during Cybersecurity Awareness Month. Learn about training enhancements, cyber exercise benefits, internal testing, and building a culture of awareness to strengthen cyber defenses. 
Posted on Oct 01 / 2024
Comprehensive Guide: Maximizing Cybersecurity with vCISO-Led Security Teams
Comprehensive Guide: Maximizing Cybersecurity with vCISO-Led Security Teams
Written by Echelon’s Cybersecurity Associate, John Hurd, our guide, "Maximizing Cybersecurity with vCISO-Led Security Teams" dives deep into the potential pitfalls and offers strategic insights to help you safeguard your organization.
Posted on Sep 11 / 2024
The Business Case for Investing in Cybersecurity Compliance
The Business Case for Investing in Cybersecurity Compliance
The idea that cybersecurity compliance is a financial obstacle is a dangerous misconception. Having robust cybersecurity compliance is more than just checking the box on compliance. It is a strategic investment that can create significant returns for any organization, but for the investment to be successful, they must commit time and resources to it. Organizations that view compliance as an opportunity rather than just a box they must check, will have a competitive advantage against competitors. Customers are more likely to trust and engage with businesses that prioritize their data and privacy. Trust can then lead to increased customer acquisition and retention for any organization.  
Posted on Aug 14 / 2024
CISOs, Are You Doing Enough to Evaluate and Address Your Vendor Risk?
CISOs, Are You Doing Enough to Evaluate and Address Your Vendor Risk?
Is your organization's Vendor Risk Management strategy robust enough? This article explores the critical role of CISOs in assessing new vendors and monitoring existing ones to safeguard against data breaches and potential disruptions. Stay ahead in the evolving landscape of third-party threats and enhance your cybersecurity posture.
Posted on Dec 15 / 2023
The CISO’s Guide to Ramping Up Cybersecurity During the Holidays: 7 Essential Steps for Incident Preparedness
The CISO’s Guide to Ramping Up Cybersecurity During the Holidays: 7 Essential Steps for Incident Preparedness
Discover 7 essential steps for CISOs to bolster cybersecurity during the holiday season. Learn how to recognize and prepare for heightened cyber threats, including data-backed insights and attack-specific playbooks.
Posted on Dec 14 / 2023
To hire, or not to hire a CISO? That is the question. Or is it though?
To hire, or not to hire a CISO? That is the question. Or is it though?
Small to mid-sized businesses often wonder whether to hire a Chief Information Security Officer (CISO). This article examines the factors for SMBs to consider when deciding to hire a full-time or fractional CISO.
Posted on May 04 / 2023
Practical Strategies to Enhance Your Organization’s Information Security Awareness and Training Program
Practical Strategies to Enhance Your Organization’s Information Security Awareness and Training Program
When it comes to cybersecurity, all organizations share a similar risk – the possibility of human error. When it comes to educating your people about cyber, one size does NOT fit all. Here are six strategies to mature your information security awareness and training program.
Posted on Feb 09 / 2023
Are Your Vendors “Tall enough to Ride the Ride”?
Are Your Vendors “Tall enough to Ride the Ride”?
We can think about an amusement park’s rider height and restriction requirements as a useful way to describe risk tolerances when onboarding new vendors or increasing scopes of work to existing ones.
Posted on Aug 22 / 2022
Postcard from the 2022 PA Bankers Convention
Postcard from the 2022 PA Bankers Convention
Upon returning home from Scottsdale, AZ for the PA Bankers Convention of 2022, I had some time to reflect on my three key takeaways from my time spent amongst leaders in the great banking industry of Pennsylvania.
Posted on May 29 / 2022
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
The Lapsus$ attacks have helped companies realize that third-party vendors can be the 'weakest link' within their own organizations. This article summarizes what companies can learn (and do) to protect data.
Posted on Apr 11 / 2022
Looking Inward, Charting a New Course for Effective TPRM
Looking Inward, Charting a New Course for Effective TPRM
Most current third-party risk management (TPRM) programs are external-facing. But what if the greatest threat to your organization wasn’t external?
Posted on Apr 06 / 2022
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
Adaptability and Perseverance – Breaking Down CrowdStrike’s Perspective on the 2022 Global Threat Landscape
The year 2021 brought about some serious cyber challenges. This article summarizes key takeaways from CrowdStrike's Global Threat Landscape report, provides a breakdown of the five 2021 themes, and gives our take on seven recommendations that resonate most with us.
Posted on Apr 01 / 2022
The Countdown Begins for Financial Institutions Using FedLine Solutions
The Countdown Begins for Financial Institutions Using FedLine Solutions
In January 2021, the Federal Reserve Banks implemented the Security and Resiliency Assurance Program outlining new compliance requirements for banks that use FedLine® by the end of 2022. This article outlines everything you need to know about this new program.
Posted on Mar 23 / 2022
Maturing Your IAM Program: Role-Based Access Control (RBAC)
Maturing Your IAM Program: Role-Based Access Control (RBAC)
Role Based Access Control (RBAC) has become the holy grail of access management. What does RBAC stand for? Here are a few tips on how to strategically approach your RBAC adoption journey.
Posted on Mar 16 / 2022
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
The Countdown is On: New Cyber Incident Reporting Requirements for Banks
Lawmakers have argued about mandatory cyber incident reporting for years, but it has never gained the traction needed to become widespread law. For those in the banking industry, this is all about to change.
Posted on Mar 02 / 2022
Top 7 Cybersecurity Predictions for 2022
Top 7 Cybersecurity Predictions for 2022
As 2021 winds down, we take a peek into the future of cybersecurity for 2022. Will our predictions come true?
Posted on Dec 14 / 2021
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
Embracing New Technology? Here’s How to Keep Cybersecurity Top of Mind
As technology advances at an unprecedented pace, many businesses are aggressively accelerating adoption to maintain a competitive advantage. But there’s a big risk for those who don’t keep cybersecurity top of mind.
Posted on Nov 10 / 2021
Are you ready to get started?