Perspectives

Proprietary data, expert analysis and bold thinking for leaders who want to achieve the extraordinary.

Home / Perspectives

Cloud On Demand

[fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#ffffff” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”1%” padding_right=”” padding_bottom=”0%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”down” animation_speed=”0.3″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Current State

[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”20″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Security is now simply too important to ignore, even more so against a backdrop of high-profile data breaches, large fines, and reputational damage.  Organizations can no longer maintain an informal, relatively lax security paradigm given the proliferation of threats in an ever-increasing interconnected world.  However, due to a limited supply of capable CISOs and the high salary necessary to attract them recruiting and retaining an experienced security leader is no easy task.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#ffffff” background_image=”https://controlpoints.com/wp-content/uploads/2019/08/green-texture.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”1%” padding_right=”” padding_bottom=”1%” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”top-into-view” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

The One Solution

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Our CISO-as-a-Service solves these challenges by providing your organization a world-class Virtual CISO (vCISO), giving you the benefits of a C-level security leader with Fortune 50 and US Government data assurance experience to help set the vision and the foundation for a formalized cyber and risk management program with the agility to prevent, detect and mitigate evolving threats.

[/fusion_text][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Stay 5 Steps Ahead with:

[/fusion_text][fusion_checklist icon=”fa-angle-right fas” iconcolor=”#027a7a” circle=”” circlecolor=”” size=”” divider=”” divider_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””][fusion_li_item icon=””]

Access to Elite Cyber Risk Knowledge, Expertise, and Network

[/fusion_li_item][fusion_li_item icon=””]

No Waiting in Line When an Issue Comes Up

[/fusion_li_item][fusion_li_item icon=””]

Peace of Mind with 24/7 Support

[/fusion_li_item][fusion_li_item icon=””]

Quality Guidance to Your Employees, Board, and Business Partners

[/fusion_li_item][fusion_li_item icon=””]

Data Assurance Powered as a Business Driver

[/fusion_li_item][/fusion_checklist][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#380b61″ background_image=”https://controlpoints.com/wp-content/uploads/2019/06/deep-2-1.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”yes” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”1%” padding_right=”” padding_bottom=”” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”0%” padding_right=”” padding_bottom=”0%” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Who This Service Is For

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_flip_boxes columns=”4″ flip_effect=”3d” flip_direction=”” flip_duration=”0.2″ equal_heights=”yes” icon=”” icon_color=”” circle=”yes” circle_color=”” circle_border_color=”” icon_flip=”” icon_rotate=”” icon_spin=”no” image=”” image_id=”” image_width=”” image_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” image_max_width=””][fusion_flip_box flip_direction=”” title_front=”” title_back=”” text_front=”PUBLIC COMPANY” icon=”” icon_color=”” circle=”” circle_color=”” circle_border_color=”” icon_flip=”” icon_rotate=”” icon_spin=”” image=”” image_id=”” image_max_width=”35″ image_height=”35″ background_color_front=”#483699″ background_image_front=”” background_image_id_front=”” title_front_color=”” text_front_color=”” background_color_back=”#0faae0″ background_image_back=”” background_image_id_back=”” title_back_color=”” text_back_color=”” border_size=”1″ border_color=”#331d99″ border_radius=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”top-into-view”]Grow shareholder value by fulfilling two fundamental fiduciary promises – financial reporting integrity and preserving your customer’s trust.[/fusion_flip_box][fusion_flip_box flip_direction=”” title_front=”” title_back=”” text_front=”PRIVATE BUSINESS” icon=”” icon_color=”” circle=”” circle_color=”” circle_border_color=”” icon_flip=”” icon_rotate=”” icon_spin=”” image=”” image_id=”” image_max_width=”35″ image_height=”35″ background_color_front=”#483699″ background_image_front=”” background_image_id_front=”” title_front_color=”” text_front_color=”” background_color_back=”#0faae0″ background_image_back=”” background_image_id_back=”” title_back_color=”” text_back_color=”” border_size=”” border_color=”#331d99″ border_radius=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.3″ animation_offset=”top-into-view”]

Fortify access to confidential growth strategies, trade secrets and investments through holistic cyber risk measures.

[/fusion_flip_box][fusion_flip_box flip_direction=”” title_front=”” title_back=”” text_front=”GOVERNMENT” icon=”” icon_color=”” circle=”” circle_color=”” circle_border_color=”” icon_flip=”” icon_rotate=”” icon_spin=”” image=”” image_id=”” image_max_width=”35″ image_height=”35″ background_color_front=”#483699″ background_image_front=”” background_image_id_front=”” title_front_color=”” text_front_color=”” background_color_back=”#0faae0″ background_image_back=”” background_image_id_back=”” title_back_color=”” text_back_color=”” border_size=”” border_color=”#331d99″ border_radius=”” animation_type=”fade” animation_direction=”right” animation_speed=”0.3″ animation_offset=”top-into-view”]

Maximize taxpayer investments by effectively aligning cyber risk management to the mission to defend and enhance vital critical functions.

[/fusion_flip_box][fusion_flip_box flip_direction=”” title_front=”” title_back=”” text_front=”HIGH VALUE DATA OWNER” icon=”” icon_color=”” circle=”” circle_color=”” circle_border_color=”” icon_flip=”” icon_rotate=”” icon_spin=”” image=”” image_id=”” image_max_width=”35″ image_height=”35″ background_color_front=”#483699″ background_image_front=”” background_image_id_front=”” title_front_color=”” text_front_color=”” background_color_back=”#0faae0″ background_image_back=”” background_image_id_back=”” title_back_color=”” text_back_color=”” border_size=”” border_color=”#331d99″ border_radius=”” animation_type=”fade” animation_direction=”right” animation_speed=”0.4″ animation_offset=”top-into-view”]

Bulletproof the security of your personal data and identity on social media, transaction sites, mobile, and personal devices.

[/fusion_flip_box][/fusion_flip_boxes][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#f0f8ff” background_image=”https://controlpoints.com/wp-content/uploads/2019/08/global-forces2.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”2%” padding_right=”” padding_bottom=”1%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”up” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

How It Works

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_tabs design=”clean” layout=”horizontal” justified=”yes” backgroundcolor=”#cdebf4″ inactivecolor=”#3ab9f4″ bordercolor=”#3ab9f4″ icon=”” icon_position=”” icon_size=”18″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””][fusion_tab title=”Step 1: Sign-up” icon=””]Quick and Easy Signup:  Select from our Silver, Gold or Platinum value package.  Complete payment.  Reserve time on our calendar for an initial requirements call.[/fusion_tab][fusion_tab title=”Step 2: Get Control” icon=””]

We’re on the front lines defending government from Nation-State actors and bring that specialized expertise to tackle your challenges.  We immediately go to work on your most pressing needs and remain on-standby to help address priority initiatives and unplanned events.

You get the help you need whenever you need it, wherever you are.  Keeping you always one step ahead!

[/fusion_tab][fusion_tab title=”Step 3: Inspire Trust” icon=””]

At the most critical moments of change, we’re there.  You get peace of mind with on-demand support, advice and guidance from an experienced in-house CISO who understands your organization and business processes.

We go beyond game-changing automation, delivering advanced cyber analytics, threat analysis, and zero-trust architecture to hone-in on true risks.  We help you anticipate real threats, prevent breaches, and minimize the business impact of incidents to engender transformative assurance.  Confidently answer the question, “is my data safe?”

[/fusion_tab][/fusion_tabs][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”benefits-section” id=”” background_color=”” background_image=”https://controlpoints.com/wp-content/uploads/2019/08/reimagined2.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”2%” padding_right=”” padding_bottom=”0px” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

How Can You Outsmart Cyber Threats

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_content_boxes layout=”icon-on-side” columns=”2″ title_size=”20px” heading_size=”5″ title_color=”#ffffff” body_color=”#ffffff” backgroundcolor=”” icon=”fa-chevron-circle-right fas” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#03a9f4″ icon_circle=”no” icon_circle_radius=”” circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”1″ outercirclebordercolor=”#ffffff” icon_size=”15″ icon_hover_type=”none” hover_accent_color=”#ffffff” image=”” image_id=”” image_max_width=”” link_type=”text” button_span=”” link_area=”link-icon” link_target=”” icon_align=”left” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_delay=”” animation_offset=”” margin_top=”” margin_bottom=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””][fusion_content_box title=”1. Amplify Your Team” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Collaborate with a single, trusted partner who brings an unrivaled breadth and depth of cyber security experience and skills. Gain access to an expert who’s secured some of the most recognizable brands in the world, has at least 10 years of IT security experience, and is decorated with certifications.

[/fusion_content_box][fusion_content_box title=”2. Enhance Your Security Program” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Measure program impact from a trust-building vantage point. Align IT and security budget line item investments precisely with protecting business-critical assets and defending trust-impacting targets. Evaluate skills, tools, and processes to harness resource productivity and lower issues count hence, raising the bottom line.

[/fusion_content_box][fusion_content_box title=”3. Accelerate Incident Investigation” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Your vCISO is on-call and can be deployed at a moment’s notice. They can work on-site or remotely to suit your needs, and can function as a leader/advisor of the security program, as a conduit to the board, or as a senior team member. You get a flexible term relationship with limited risk.

[/fusion_content_box][fusion_content_box title=”4. Immediate Surge Capacity” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Enhance your team’s skill with learning from and with an elite security practitioner. When necessitated by unique situations gain the benefits of a greatly expanded intellectual talent pool from our vetted network of cloud architects, security engineers, DoD pen testers, CPAs, and more.

[/fusion_content_box][fusion_content_box title=”7. Expedite Risk Reduction” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

We hit the ground running to strategically prioritize security initiatives, implement measures correctly the first time, and fix long standing issues vendors are unable to resolve. Gain the assurance of having ControlPoints on standby for immediate premium advice in response to a breach.

[/fusion_content_box][fusion_content_box title=”5. Increase Situational Awareness” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Get an objective, independent and unbiased view of your security program, processes and tools at breakneck speeds with actionable recommendations to improve performance. Expertly implement security controls critical to your unique business and risk profile.

[/fusion_content_box][fusion_content_box title=”6. Simplify HR” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Avoid a protracted search for a full-time position, for a role difficult to fill with frequent turnover, and logistics overhead with onboarding, training, travel and separation.

[/fusion_content_box][fusion_content_box title=”8. Raise Return on Investment” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Our on-demand vCISO costs up to 40% less than a full-time CISO and provides 7x greater savings. Our expert vCISO requires no training and is purely results-driven. Letting you stay focused on the core business objectives.

[/fusion_content_box][fusion_content_box title=”9. Modernize IT” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Employ a laser-focused risk-adaptive approach to IT modernization with minimal invasiveness and friction to quickly and securely bring solutions to market. Secure the enterprise without disrupting user experience.

[/fusion_content_box][fusion_content_box title=”10. Force Multiply” backgroundcolor=”” icon=”” iconflip=”” iconrotate=”” iconspin=”no” iconcolor=”#3a7cb9″ circlecolor=”rgba(255,255,255,0)” circlebordersize=”” circlebordercolor=”” outercirclebordersize=”2″ outercirclebordercolor=”#3a7cb9″ image=”” image_id=”” image_max_width=”” link=”” linktext=”Read More” link_target=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Automate manual processes to eliminate errors and jumpstart productivity.

[/fusion_content_box][/fusion_content_boxes][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”choose-package” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”1%” padding_right=”” padding_bottom=”1%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”up” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Pricing Plan

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_table fusion_table_type=”2″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Plan Options Silver Gold Platinum
Price per Annum * $24K $60K $120K
Support Hours per Year ^ 96 288 600
Quarterly Check-in Call
Product Discounts
Annual Risk Assessment
Annual Strategic Roadmap
Premium Whitepapers
How-to Checklists and Guides
Knowledge Sharing Call with Peers
Video Series: CISO Best Practices

[/fusion_table][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”25″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

* Billed Monthly:  Silver – $1,999, Gold – $4,999, Platinum – $9,999
^ Support Hours per Month:  Silver – 8hrs, Gold – 24hrs, Platinum – 50hrs
Note: Unused hours roll-over for a 12-month period.

[/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”25″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

7x Return on Investment

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Our retainer service provides high-calibre security leadership at a fraction of the cost of hiring a CISO – 7 times the savings to be exact.

[/fusion_text][fusion_table fusion_table_type=”2″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]

Cost Over Time Our vCISO Service Full Time CISO*^
Year 1 $24,000 $150,000 or higher
$20,000 hiring cost
Year 2 $24,000 $155,000
Year 3 $24,000 $160,000

[/fusion_table][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”25″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

* CISO salary taken from publicly available figures for the year 2018
^ Full-time employees also require budget considerations for training, holiday, benefits, and sick leave

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Container” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”choose-package” id=”cloud-package” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”40″ padding_right=”” padding_bottom=”40″ padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”up” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Ready to Take Control

[/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”30″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

To ensure you get support at the moment of need, we recommend you lock down our retainer service today. You don’t want to have to get in line or scramble to find a resource when an issue comes up. Scale up or down as business conditions change.

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-col” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true” spacing_right=””][fusion_builder_row_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”35″ padding_right=”20″ padding_bottom=”15″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Silver

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”0″ padding_right=”10″ padding_bottom=”0″ padding_left=”10″ margin_top=”0″ margin_bottom=”0″ animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Includes strategic and tactical support with current and planned cyber risk initiatives. Quarterly call to review progress, issues, and investments.

$1,999/month

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”8″ padding_right=”20″ padding_bottom=”30″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”5″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]


[/fusion_text][/fusion_builder_column_inner][/fusion_builder_row_inner][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-col” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false” spacing_right=””][fusion_builder_row_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”35″ padding_right=”20″ padding_bottom=”15″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Gold

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”0″ padding_right=”10″ padding_bottom=”0″ padding_left=”10″ margin_top=”0″ margin_bottom=”0″ animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Everything in Silver plus get an annual enterprise risk assessment and strategic roadmap to recalibrate risks and the go-forward vision.

$4,999/month

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”8″ padding_right=”20″ padding_bottom=”30″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”5″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]


[/fusion_text][/fusion_builder_column_inner][/fusion_builder_row_inner][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-col” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false”][fusion_builder_row_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”35″ padding_right=”20″ padding_bottom=”15″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Platinum

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”0″ padding_right=”10″ padding_bottom=”0″ padding_left=”10″ margin_top=”0″ margin_bottom=”0″ animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

Everything in Gold plus access to advanced whitepapers, self-help checklists, guides and videos. Strategic networking opportunity with peers.

$9,999/month

[/fusion_text][/fusion_builder_column_inner][fusion_builder_column_inner type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”pricing-inner-col” id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_color=”” border_style=”solid” padding_top=”8″ padding_right=”20″ padding_bottom=”30″ padding_left=”20″ margin_top=”0px” margin_bottom=”0px” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_position=”all” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”5″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]


[/fusion_text][/fusion_builder_column_inner][/fusion_builder_row_inner][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Hourly Billing” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”rgba(0,0,0,0)” background_image=”https://controlpoints.com/wp-content/uploads/2019/07/galaxy1.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.2″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”2%” padding_right=”” padding_bottom=”2%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_6″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”8%” padding_bottom=”” padding_left=”8%” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true” spacing_right=””][/fusion_builder_column][fusion_builder_column type=”2_3″ layout=”2_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”#ffffff” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”30px” padding_right=”40px” padding_bottom=”30px” padding_left=”40px” margin_top=”” margin_bottom=”55″ animation_type=”fade” animation_direction=”left” animation_speed=”0.4″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false” spacing_right=””][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

You Have Options

Complete Form to Engage Consulting by the Hour

[/fusion_text]

    [cf7sr-simple-recaptcha]

    [/fusion_builder_column][fusion_builder_column type=”1_6″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”8%” padding_bottom=”” padding_left=”8%” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false”][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#000000″ background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”1%” padding_right=”” padding_bottom=”1%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” border_radius_top_left=”” border_radius_top_right=”” border_radius_bottom_left=”” border_radius_bottom_right=”” box_shadow=”no” box_shadow_vertical=”” box_shadow_horizontal=”” box_shadow_blur=”0″ box_shadow_spread=”0″ box_shadow_color=”” box_shadow_style=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”fade” animation_direction=”up” animation_speed=”0.4″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

    Frequently Asked Questions

    [/fusion_text][fusion_separator style_type=”single solid” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”#3a7cb9″ top_margin=”” bottom_margin=”50″ border_size=”3″ icon=”” icon_circle=”” icon_circle_color=”” width=”100px” alignment=”center” /][fusion_accordion type=”” boxed_mode=”yes” border_size=”1″ border_color=”#000000″ background_color=”#e5e5e5″ hover_color=”#e5e5e5″ divider_line=”” title_font_size=”18px” icon_size=”20″ icon_color=”#5fc5f4″ icon_boxed_mode=”no” icon_box_color=”” icon_alignment=”left” toggle_hover_accent_color=”#03a9f4″ hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””][fusion_toggle title=”What is a CISO?” open=”no”]The Chief Information Security Officer (CISO) is the most senior decision maker for information security and is pivotal to protecting the business from damaging attacks resulting in data loss.  The CISO serves as the principal information security specialist and consultant to senior management, business process owners, and end users.  The CISO is responsible for establishing and maintaining the enterprise vision, strategy, budget, and program to ensure information assets and technologies are adequately protected.  The CISO is also heavily involved in formulating regulatory and compliance plans to safeguard data privacy and prevent fraud and data breaches.[/fusion_toggle][fusion_toggle title=”Why Do I Need a Virtual CISO?” open=”no”]

    Security is now simply too important to ignore, even more so against a backdrop of high-profile data breaches, large fines, and reputational damage thanks to more stringent regulation and enforcement powers.  Opportunistic cybercriminals target businesses where they can take advantage of haphazard or inconsistent focus on security practices.  The responsibility and potential impact is too great to be left in the hands of unqualified part timers.

    Clearly, someone must own the security and compliance strategy, but the requirement can extend beyond the expertise of operational IT and Security Managers.  However, recruiting an experienced security leader is no easy task. Cyber Security is a specialised field, requiring thorough knowledge of contemporary security technologies, and clear understanding of the current threat landscape and the latest defence best-practice.  Due to a rapid pace of change there remains a significant gap in skills between increasingly sophisticated hackers and tech employees.  An experienced and skilled executive is paramount to identify what those specific gaps are and address them holistically at their root quickly and effectively.

    Research undertaken by the Ponemon Institute concluded that, for organizations holding personal data, appointing a CISO reduced on average the cost of a security breach by $6 per data record. This adds up to a significant potential saving considering the number of personal records your organization now holds – not just those of your customers and prospects, but also of your employees.

    [/fusion_toggle][fusion_toggle title=”Is a CISO Required by Law?” open=”no”]

    Organizations can no longer maintain an informal, relatively lax security paradigm given the proliferation of threats in an ever-increasing interconnected world.  Notwithstanding large fines if found non-compliant with regulations or having suffered a security breach due to missteps, the market will demand answers from a credible representative of the organization.

    Many businesses mistakenly appoint “security officers” that do not have sufficient formal security experience and skills.  This is not recommended because it can have very serious consequences.  Given the complex financial and legal ramifications, various regulations and compliance drivers necessitate the hiring of a credible, experienced CISO.  Some examples include but are not limited to:

    • Federal Information Security Management Act (FISMA)
    • European Commission’s General Data Protection Regulation (GDPR)
    • Financial Industry Regulatory Authority Contact System (FINRA FCS)
    • New York Department of Financial Services Cyber Security Regulations (NY DFS)

    Notwithstanding regulations, companies also face increasing market pressures to ensure customer’s privacy and security while safeguarding shareholder investments.  A capable CISO can adapt and quickly grasp the unique business environment the organization operates in and is able to keep the business from incurring penalties, lawsuits, bad press, or worse.

    [/fusion_toggle][fusion_toggle title=”Should I Hire a Full-Time CISO or a Virtual CISO?” open=”no”]

    Why would you need a vCISO when you could simply hire a real one on a permanent basis? The answer is varied and not necessarily the same for everyone.  The majority of large corporate organizations employ a dedicated CISO to lead a security function, tasked with protecting the organization from the ever-evolving cyber threat.  But for smaller organizations, the investment in a full-time member of the senior management team focused solely on security is often impossible to justify, especially when there isn’t enough work to keep a full-time CISO busy.  Even if you do manage to win approval to hire a full-time employee to lead your cyber and risk efforts, you will undoubtedly face major recruitment and retention challenges: CISO’s worth their salt are in high demand, competition is fierce for the limited supply of qualified CISOs, and many command six-figure salaries.  What’s more, they often stay in their job for two years or less because surveys reveal many CISOs register concerns of being “burned out” from stress and overwork.

    In contrast, a Virtual CISO is the ideal choice when there isn’t a full-time requirement for a CISO, or a major initiative requires deeper oversight, or when the existing CISO can benefit from some assistance.  Virtual CISOs are estimated to cost 30 – 40 percent of a full-time CISO and are available on-demand, but the benefits go well beyond cost.  Virtual CISOs usually require no training, can hit the ground running, are purely results-driven, and provide reasonable key performance indicators (KPIs) and reporting to measure success.  Having a seasoned security professional overseeing your organization’s cyber security will lead to the desired outcomes in a more cost-effective manner.  A vCISO service offers flexibility and can be tailored to your business’ needs.

    [/fusion_toggle][fusion_toggle title=”How Much Does a Virtual CISO Cost?” open=”no”]

    Waiting until a cyber problem such as a security breach has happened, before finding the expertise to deal with it is a foolhardy approach: prevention is more effective and less costly than cure.  But bolting on security controls as an afterthought is invariably also expensive and less effective than building them into your systems and processes from the start.  According to Gartner – a leading technology research company – organizations spend, on average, 5.6% of their overall IT budget on security and risk management. Your organization needs a strong understanding of security risk management and effective mitigation strategies to maximize the value of your cyber security investment.  A Chief Information Security Officer (CISO) ensures that your organization’s security budget is spent effectively.

    CISOs however are highly sought after, and with a restricted supply the good ones are expensive and hard to come by.  The salary range of a full-time CISO is $180k-$200k per year.  Add on benefits, bonuses, stock programs and the total compensation rises to $250k-$300k.  A vCISO can cost a fraction of that amount, as little as $35k per year and as much as $250k per year.

    Some businesses may have a hard time justifying the salary and overhead of another full-time, permanent executive, while others may find it difficult to compete for high-level talent.  Meanwhile some organizations may not even need a full-time CISO.  A qualified vCISO who does not require benefits or an arduous on-boarding process can save both time and money.

    [/fusion_toggle][fusion_toggle title=”Why Hire Us?” open=”no”]

    Many businesses have highly capable people with regards to their core business.  Where they require support though, is and around understanding their threat landscape, regulatory requirements, defining an appropriate strategy and roadmap, and implementing with certainty.  As a trusted advisor to Fortune 50 and big government customers, there is no challenge or issue we haven’t seen before. We know where to find value, what works and what often fails.

    A virtual CISO from ControlPoints provides access to an experienced security professional who enables your organization to have a strategy for security, taking a holistic, risk-driven approach to protecting vital assets and building trust in an increasingly interconnected world.

    What Makes Our Service Unique?

    A study conducted by the Harvard Business Review finds 85% of executives from companies with mature practices cite trust as a necessary precondition for collaboration and innovation. Yet, only 9% of executives say their organizations are currently able to accurately measure the value of trust for their businesses. Our CISO-as-a-Service offering is specifically designed to build and measure trust as a business driver, resulting in increased employee productivity and innovation. Here’s how we help you demonstrate trust: update/expand your cybersecurity strategy, employ risk analytics expertise, leverage thought leadership to help your organization get smarter and respond to threats faster, hire qualified cybersecurity expertise, invest in employee training, create third-party management strategy.

    Recognizing that companies are in three potential states of defining, managing, or optimizing their security programs, we develop managed service models that align to these collective stages of security maturity.  For this reason over 90% of our customers rehire us because they see a clear return on their trust and risk investments.

    Contracting a ControlPoints virtual CISO can give you access to the skills and experience of a C-level security leader much faster than going through a protracted search for a full-time position. A virtual CISO is an on-demand expert who provides more flexibility to work on specific projects and can scale as needed.  Notable advantages:

    • Unrivaled Expertise and Guidance.  It takes more than purchasing boiler plate written policy to create a meaningful cyber program that effectively cascades through the enterprise and fully integrates your risk management objectives.  When you want to take your business to the next level, you need to collaborate with a single, trusted partner who brings an unrivaled breadth and depth of cyber security experience and skills.  We support a myriad of organizations and bring lessons learnt from other industries to help modernize your security approach with best-practice structure, rigor and accountability.  Get rapid technical support, advice and organizational response to breaches from an experienced cyber security professional who integrates seamlessly and pain-free with your existing personnel;
    • Stay Focused on Your Core Business.  We help you reduce your level of management oversight.  Get real-time access to senior strategic security expertise to supplement the existing management team or to provide coverage as an interim solution.  Outsourcing the CISO role allows your organization to stay focused on the core business objectives, while still benefitting from our expertise and experience to develop and maintain a robust information security program;
    • Upskill Your Team.  We are equipped with world-class processes and varied industry perspective having worked with a wide-range of companies to quickly deliver superior results.  Depending on the terms of the engagement – we can function as a leader/advisor of the security program, as a conduit to the board, or senior team member.  In all cases we champion the existing IT teams and ensure they are provided sufficient time and resources to carry out their functions properly.  Enhance your team’s skill with practitioner-led on the job training;
    • Drive Cost Effectiveness.  Get the advantages and peace of mind of an in-house, full time CISO at a fraction of the cost and without the recruitment challenges, fixed overheads and retention challenges.  We develop a custom-managed infosec program for your organization based on your company’s current needs, maturity of the security controls and IT platforms.  We complement, utilize and develop your existing capability to maximize invested capital.  What’s more, our typical engagements decrease in cost over time because your security program is designed with proven cyber transformation, maximum automation, mature processes, and repeatable security methods;
    • Expedite Change Effectively.  We will collaborate with you during the implementation of any remedial activities and provide support and assistance during the transition from reactive processes to proactive, risk-driven and business aligned information security that delivers on all your legal and regulatory obligations.  We monitor trends to keep pace with the threat landscape that help you maintain situational awareness and strengthen security operations.

    End-to-end Governance, Risk, Compliance, Cyber, CISO (GRC3) Services Provided by Unrivaled Experts

    Comparison of Benefits ControlPoints vCISO Independent Contractor Full-Time CISO
    Verifiable Industry Experience
    Strategic Security Vision & Planning
    Flexible Investment
    Objectivity & Independence
    No Training & Certification Costs
    Fortune 50 and Government Cyber Performance
    GRC3 Strategy-Implementation-Remediation
    Proven Transformation Methodology
    Infuse Advanced Risk Analytics
    Update Annual Risk Assessment & Roadmap
    Trust Performance Reporting
    Access to a Team of Domain Experts
    No Turnover
    Implement Controls That Pass 100% of Audits
    Highest Value and ROI

    Get 7x the Value by Only Paying For What You Need

    Cost-effective access to a licensed and experienced professional without breaking the budget.

    Cost Over Time Our vCISO Service Full Time CISO*^
    Year 1 $24,000 $150,000 or more
    $20,000 Hiring Cost
    Year 2 $24,000 $155,000
    Year 3 $24,000 $160,000

    * CISO salary taken from publicly available figures for the year 2018
    ^ Full-time employees also require budget considerations for training, holiday, benefits, and sick leave.

    Your CISO will help you with access to strategies and resources that you could not afford to maintain on a full-time basis, keeping you ahead of the game.  To ensure you get the support at the moment of need, we recommend you lock down our retainer service today.  We have a limited schedule of availability, and once it fills our schedule could get very busy working with other clients.  When an issue comes up where you need or want assistance and help, you don’t want to have to get in line.  Sign-up for a package that works best for you and you’ll get peace of mind knowing that any time something comes up you can give us a quick call or send an email.  As your advisor, we’re there on your side to consistently support the growth of your business and help with any of the challenges that might come up.

    [/fusion_toggle][fusion_toggle title=”What Outcomes Should I Expect” open=”no”]

    ControlPoints’ CISO consultants are highly experienced, with extensive senior / CISO level experience already under their belts.  Your vCISO will initially carry out a detailed security assessment of your organization, taking a wide-view across the entire business to reveal the true extent of the challenges to be resolved.  We also look at the business in depth to identify what are the valuable assets and where they exist, the protections around them and recommend solutions to fill any gaps.  We will deliver a report highlighting areas of weakness, before providing board-level engagement to win the investment required to mitigate your organisation’s key cyber security risks.  The initial report will serve as a baseline, enabling you to de-scope, re-architect and reduce exposure before proceeding.

    Next, a comprehensive project plan and strategy will be developed to govern the information security program in tandem with the in-house IT team. We will review and normalize existing tools, techniques and policies benchmarked against industry leading solutions, conduct due diligence audits, oversee existing projects, and provide technology leadership; all the while acting as a member of your IT team and making sure our thinking is in the best interests of the business as a whole.  By acting as an extension of your in-house resources and gaining an intimate understanding of your business needs, the ‘CISO’ will provide ongoing management, remediation support, security advice and oversight.

    We strive to deliver a flexible, responsive, personalized, and meaningful security program to each customer.  Throughout the life of the engagement our reporting will keep you abreast of what we are working on month to month, the tangible outcomes, and the value being generated as a result of the work.  Moreover, at a frequency of your choosing we’ll meet for a proper conversation but we’ll stay in touch in-between for lighter-touch support and questions.  If you’re ever really stuck you don’t have to wait for our next meeting – we’ll always make time whenever possible at short notice and no extra charge.  If it ever feels like projects require reprioritization we can just have a conversation and adjust as needed.

    [/fusion_toggle][/fusion_accordion][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”” id=”” background_color=”#000000″ background_image=”https://controlpoints.com/wp-content/uploads/2019/07/galaxy2.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.1″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”45″ padding_right=”” padding_bottom=”40″ padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_6″ layout=”1_6″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_image_id=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true” spacing_right=””][/fusion_builder_column][fusion_builder_column type=”2_3″ layout=”2_3″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_image_id=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”false” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false” spacing_right=””][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

    Need More Information? Schedule a FREE 25 Minute Call

    [/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”25″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_code]PCEtLSBTdGFydCBTcXVhcmUgQXBwb2ludG1lbnRzIEVtYmVkIENvZGUgLS0+CjxzY3JpcHQgc3JjPSdodHRwczovL3NxdWFyZS5zaXRlL2FwcG9pbnRtZW50cy9idXllci93aWRnZXQvNnV0eXpzemgzazR2eHQvNVAzUFRUTUFCSDBQQy5qcyc+Cjwvc2NyaXB0PjwhLS0gRW5kIFNxdWFyZSBBcHBvaW50bWVudHMgRW1iZWQgQ29kZSAtLT4=[/fusion_code][/fusion_builder_column][fusion_builder_column type=”1_6″ layout=”1_6″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_image_id=”” background_position=”left top” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”false”][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Newsletter Section” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” status=”published” publish_date=”” class=”ciso-form-sec” id=”” background_color=”#ffffff” background_image=”https://controlpoints.com/wp-content/uploads/2019/05/continents.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”up” enable_mobile=”yes” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”5%” padding_right=”” padding_bottom=”5%” padding_left=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” link=”” target=”_self” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_image_id=”” background_color=”” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” hover_type=”none” border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”true” border_sizes_top=”0″ border_sizes_bottom=”0″ border_sizes_left=”0″ border_sizes_right=”0″ first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

    Interview with General Nakasone

    [/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”17″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

    Read Thought Leadership from the Head of US Cyber Command

    [/fusion_text][fusion_separator style_type=”none” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” sep_color=”” top_margin=”8″ bottom_margin=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” /][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””]

      [/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

      document.addEventListener("DOMContentLoaded", function () { const section = document.querySelector(".cp-authority-strip"); const counters = document.querySelectorAll(".cp-counter"); if (!section || !counters.length) return; let started = false; function animateCounter(counter) { const target = parseInt( counter.getAttribute("data-target"), 10 ); let current = 0; const increment = target / 120; function updateCounter() { current += increment; if (current < target) { counter.innerText = Math.floor(current).toLocaleString(); requestAnimationFrame(updateCounter); } else { counter.innerText = target.toLocaleString(); } } updateCounter(); } function checkScroll() { if (started) return; const sectionTop = section.getBoundingClientRect().top; const triggerPoint = window.innerHeight * 0.78; if (sectionTop < triggerPoint) { started = true; counters.forEach((counter, index) => { setTimeout(() => { animateCounter(counter); }, index * 220); }); window.removeEventListener( "scroll", checkScroll ); } } window.addEventListener( "scroll", checkScroll ); checkScroll(); });