Cybersecurity Services
Overview
vCISO-Led Security Team as a Service (STaaS)
Offensive Security + Adversary Simulation
Defensive Security Services + Hardening
Risk Advisory + GRC
Industries
Overview
Financial Services
Higher Education
Healthcare
Technology and SaaS
Sports & Entertainment
Manufacturing
Professional Services
Retail
Not for Profit
Defense Industrial Base (DIB)
Partners
About
Careers
Intelligence
Articles
Webinars
Cybersecurity Services
vCISO-Led Security Team as a Service (STaaS)
Offensive Security + Adversary Simulation
Defensive Security Services + Hardening
Risk Advisory + GRC
Industries
Financial Services
Higher Education
Healthcare
Technology and SaaS
Sports & Entertainment
Manufacturing
Professional Services
Retail
Not for Profit
Defense Industrial Base (DIB)
Partners
About
Careers
Intelligence
Press and Events
Contact
Latest Intelligence
Breaking Barriers: How Alyson Pisarcik Carved Her Own Path in Cybersecurity Consulting
This month, we’re featuring Alyson Pisarcik, Cybersecurity Manager for Risk Advisory and GRC services at Echelon, whose journey into cyber started with a leap of faith and a passion for solving complex problems. From overcoming imposter syndrome to taking control of her own career trajectory, Alyson shares how she navigated an industry that’s always evolving and how she’s using her experience to help others break into the field.
Posted on Mar 14 / 2025
How Montauk Renewables Slashed Cyber Risk by 90%—And How You Can Too
Montauk Renewables reduced critical vulnerabilities by 90% with Echelon’s vCISO and Security Team as a Service. Through a structured 12-month cybersecurity roadmap, we helped Montauk enhance IT-OT security, meet SEC compliance, and shift from reactive firefighting to strategic cybersecurity execution. Download the full case study to see how we transformed their security posture.
Posted on Mar 14 / 2025
Managed Firewall Services: Enhancing Security and Simplifying Operations
Discover how Managed Firewall Services enhance cybersecurity, reduce complexity, and ensure compliance with 24/7 expert management and proactive threat prevention.
Posted on Mar 11 / 2025
Intelligence
tagged
TPRM
CISOs, Are You Doing Enough to Evaluate and Address Your Vendor Risk?
Is your organization's Vendor Risk Management strategy robust enough? This article explores the critical role of CISOs in assessing new vendors and monitoring existing ones to safeguard against data breaches and potential disruptions. Stay ahead in the evolving landscape of third-party threats and enhance your cybersecurity posture.
Posted on Dec 15 / 2023
It’s Time for Healthcare to Focus on Vendor Risk Maturity
Cybersecurity breaches are on the rise for healthcare, with many coming through the supply chain. Here's practical advice on how to assess the maturity of a third-party risk management program and reduce the risk associated with vendors and business partners.
Posted on May 22 / 2023
Are Your Vendors “Tall enough to Ride the Ride”?
We can think about an amusement park’s rider height and restriction requirements as a useful way to describe risk tolerances when onboarding new vendors or increasing scopes of work to existing ones.
Posted on Aug 22 / 2022
What the Lapsus$ Attacks Should Teach Us About Third-Party Insider Threat
The Lapsus$ attacks have helped companies realize that third-party vendors can be the 'weakest link' within their own organizations. This article summarizes what companies can learn (and do) to protect data.
Posted on Apr 11 / 2022
Looking Inward, Charting a New Course for Effective TPRM
Most current third-party risk management (TPRM) programs are external-facing. But what if the greatest threat to your organization
wasn’t
external?
Posted on Apr 06 / 2022
Search
Articles
Webinars
Sections
Beyond the Baseline: A New Approach to IT Audits
CISO's Corner
Compliance
Cyber Career Tips
Cybersecurity Champions
Cyber Intelligence Weekly
Defensive Security Services
Downloadables
Financial Services
Hacker's Perspective: Tips for Defenders
Higher Education
Healthcare
Improving Cyber Hygiene
Manufacturing
Offensive Security
Our People
Tech Dives
Technology & SaaS
Identity Access Management
Sign Up
Are you ready to get started?
Are you ready to get started?
Contact Us