Home / Solutions / Virtual CISO
Advisory with execution muscle A vCISO backed by the same MSSP that runs your SOC, IR, and backup.

A CISO in the room, when you need one.

Boards ask about cyber. Insurers ask about program maturity. Auditors ask who’s accountable. SOC 2, Law 25, and PIPEDA all assume a named security leader — but a senior CISO is a $350K+ hire with a 40-week bench. vCISO gives you the seniority, the judgment, and the named accountability at the cadence the business actually needs: a day a month, a week a month, or embedded through a milestone.

Senior CISOs, 20+ yrs in the seat
Board-ready reporting from day one
Canadian, on your time zone
What you get

A security leader who shows up and shows work.

Not a consulting deliverable. A named accountable leader in your program, on your calendar, at your board table, answering to your regulators. Measured in outcomes your CFO and your auditor both recognize.

20+ yrs
Senior CISO seniority
Former enterprise and mid-market CISOs, not re-badged consultants. Regulated-sector experience across FinServ, legal, health, and defence.
1
Named accountable leader
Same person at every board meeting, every audit, every insurance renewal. Listed on your program documents by name.
90 days
Program on paper
Maturity assessment, risk register, prioritized roadmap, budget, and board report delivered inside the first quarter.
1
MSSP behind them
Recommendations backed by SOC, IR, pen test, and backup teams under one roof — not vendor matchmaking.
What's included

Twelve capabilities, three mandates.

Strategy sets the direction and talks to the board. Compliance & Regulatory clears the auditor and the insurer. Execution handles the work that a program actually stands or falls on.

Strategy & Leadership

Direction & the board table

Security Program Strategy & Roadmap

A written security strategy aligned to business objectives, with a 12- to 24-month roadmap, milestones, dependencies, and measurable outcomes your CFO will sign off on.

Board & Executive Reporting

Quarterly board packages, executive risk summaries, and committee briefings. Cyber translated into business risk language, not CVSS scores.

Risk Management Framework

Enterprise risk register, risk acceptance workflow, and quantitative risk analysis where it matters. NIST CSF 2.0 or ISO 27005 aligned.

Security Budget & Investment Planning

Multi-year cyber investment plan, tool rationalization, vendor consolidation, and ROI modeling — so the ask at budget time is defensible, not a wishlist.

Policy, Standards & Governance

Policy library development and maintenance, standards alignment (ISO 27002, CIS Controls v8), and governance-committee operation. The paper trail auditors actually accept.

Compliance & Regulatory

Auditors, regulators, insurers

SOC 2 / ISO 27001 / PCI-DSS Advisory

Readiness assessment, control design, evidence program setup, and ongoing operator through certification and surveillance. Shortens first-time audits from 18 months to 6.

Canadian Privacy Program

PIPEDA, Quebec Law 25, Alberta PIPA, BC PIPA, and Ontario PHIPA compliance program design. Privacy Officer advisory, PIAs, and regulator-facing evidence.

Cyber Insurance Readiness

Underwriter questionnaire navigation, control attestations, premium negotiation support, and claim-readiness reviews. Insurers now differentiate on program maturity — evidence matters.

Audit Preparation & Response

Pre-audit gap assessments, evidence packaging, auditor relationship management, and finding remediation. Turn auditor weeks into auditor days.

Execution & Program Delivery

The work behind the strategy

Vendor & Third-Party Risk

Vendor risk management program, tiering, security questionnaires, contract security addenda, and continuous monitoring. Because your weakest vendor is your weakest link.

M&A Cyber Due Diligence

Buy-side and sell-side cyber due diligence, post-acquisition integration security, and carve-out planning. Material cyber findings surfaced before the PA, not after.

Security Awareness & Culture

Annual training program, phishing simulation strategy, and executive tabletop facilitation. The human-layer controls auditors and insurers both now ask about.

Advisory with execution muscle

Most vCISOs write roadmaps. Ours runs them.

A vCISO who only advises can tell you to implement MDR, harden Active Directory, get a pen test, and rehearse your IR plan — and then hand you a vendor matchmaking problem. Because AlecTech is a full MSSP, the recommendation and the execution live under one roof. Your vCISO walks into the board meeting having already talked to the team that runs your SOC that morning. No translation layer, no blame shift, no coordination overhead you’re paying for twice.

  • Same MSSP runs MDR, IR, pen test, backup, DR, and GRC — your vCISO has the whole bench in the room
  • Roadmap items become delivered work, not RFPs to a rotating cast of vendors
  • Single contract, single accountable team, single set of metrics tracked end-to-end
  • Program maturity reporting is generated from live operational evidence, not self-attestation
See engagement tiers
1
Contract covering advisory and the execution to back it
0
Vendor matchmaking between the vCISO and the doers
100%
Canadian-staffed, including the CISOs themselves
24/7
SOC and IR team behind every recommendation

One MSSP. Advisory that turns into delivery.

When your vCISO’s roadmap calls for 24/7 detection, hardening validation, or a tested recovery plan, those aren’t three new procurements. They’re the team down the hall. Strategy and execution flow through one chain of accountability — which is exactly what auditors, insurers, and boards have started insisting on.

Credentials, frameworks, and standards
Senior CISOs with the certifications your board, auditors, and insurers look for — and fluency in the frameworks your regulators apply.
CISSP
Certified Information Systems Security Professional
CISM
Certified Information Security Manager
CRISC
Certified in Risk & Information Systems Control
CIPP/C
Certified Information Privacy Professional — Canada
ISO 27001 LA
ISO 27001 Lead Auditor
CISA
Certified Information Systems Auditor
NIST CSF 2.0
ISO/IEC 27001 / 27002
SOC 2 Type II
CIS Controls v8
PCI-DSS 4.0
PIPEDA / Law 25
CyberSecure Canada
Engagement lifecycle

From handshake to board-ready in four phases.

Whether the engagement is ongoing program leadership or a fixed-scope milestone, the sequence is the same. No surprises on deliverable, scope, or cadence — and evidence of progress the business and the auditor both recognize.

  • 01Weeks 1–4
    Assess Stakeholder interviews, maturity assessment against NIST CSF 2.0 or ISO 27001, gap analysis, and a written baseline of where the program actually stands.
  • 02Weeks 4–12
    Strategize Risk register, prioritized roadmap, multi-year budget, program charter, and the first board report. Strategy signed off before execution begins.
  • 03Months 3–12
    Execute Quarterly roadmap delivery, monthly operating cadence, ongoing board and committee reporting, audit and insurer engagements handled end-to-end.
  • 04Year 2+
    Mature Continuous program improvement, annual maturity re-assessment, refreshed roadmap, and the program evolving from compliance floor to competitive advantage.

Every engagement is anchored by a named vCISO — not a rotating pool — and a program coordinator who runs the monthly cadence so the vCISO’s time is spent on judgment calls, not calendar work.

Deliverables across the first 90 days include: maturity assessment report, enterprise risk register, 12–24-month roadmap, security budget, board-ready executive briefing, and a program charter.

Every meeting produces minutes, decisions, and action items tracked in a shared program workspace — so audit evidence accumulates by default, not as a scramble before the review.

Engagement tiers

Four cadences. Same named leader.

Different organizations need different cadences. Same vCISO, same discipline, same deliverables — scaled to what the business actually needs this year. Tiers can be shifted as the program matures or a milestone demands more intensity.

Tier 1

Advisory

1–2 days / month · ongoing

Board and committee attendance, policy oversight, quarterly strategy reviews, and on-call advisory for material decisions. A named leader on the org chart without the program-operator load.

Tier 3

Embedded

8–12 days / month · ongoing

Near-full-time CISO coverage for regulated, acquisitive, or heavily audited organizations. Deep program operation, hands-on with major initiatives, on the exec team.

Tier 4

Project-based

Fixed scope · 8–24 weeks

Milestone-driven engagements: SOC 2 readiness, M&A cyber due diligence, insurance renewal, post-incident program rebuild, or interim CISO coverage during hiring.

Put a CISO on the org chart. Not on the payroll.

A 30-minute introductory call with a senior vCISO — not a sales rep. We’ll walk through your current program, the milestones this year demands, and which engagement tier actually fits. No deck. A short conversation and a clear proposal.