Jericho Cyber is a CISO-as-a-Service organization backed by 32+ years of real-world experience in Manufacturing, Retail, Government, Military, and Association Management. Whether you need a vCISO for a project, a Fractional CISO a couple of days a week, or an interim CISO, Jericho Cyber can help.
A virtual CISO, also known as a fractional CISO, is a service that provides organizations with access to leading security professionals for expert security advice and strategic direction. Our seasoned team boasts years of experience in developing information security strategies that align with and support business goals, delivering tangible enhancements to the organization’s security stance.
Founded in 2021 and backed by 32+ years of experience, Jericho Cyber offers a broad range of CISO Advisory Services. Whether you are looking to stand up a new capability or fix one that is broken, Jericho Cyber can help.

We evaluate existing Information Security programs to identify problematic areas and recommend corrective measures.

We design Information Security capabilities for any sized organization and any sized budget from team establishment to the development of processes and controls.

Development of long-range security plans that align with corporate goals. This includes budget development and forecasting future spend.

We help you screen candidates for new opportunities or review existing staff for proper fit and re-skilling opportunities.

Develop capabilities to address emerging needs and ensure that the team is adequately trained and is prepared to respond in the event of a cyber event.

Development of job description criteria to ensure that proper fit with the needs of the capability.

Teams are at their best when they have had the opportunity to work under pressure. Table-Top Exercises provides real-world scenarios to evaluate the performance of the team before a real event hits.

Selecting the right security framework is not only critical to the company’s compliance objectives, but it must be sustainable by the team. We help you identify the right framework for your market vertical.

Develop capabilities to achieve and maintain compliance obligations as well as establishing governance and regular assessment of internal capabilities.

Threat and Vulnerability is a capability that is responsible for overseeing the security practices related to vulnerability management, application security, threat assessment and threat intelligence. Their duties include threat hunting, managing incident response and investigations and staying up to date on security trends to enhance the organization’s defenses. This capability plays a crucial role in protecting an organization’s IT infrastructure by identifying, tracking, and mitigating security threats and vulnerabilities.

A good cyber security awareness program is one that effectively educates and engages all members of an organization in understanding the importance of cybersecurity, recognizing threats, and taking the appropriate actions to maintain security.

A Security Operations Center (SOC) is a centralized unit that continuously monitors and improves an organization’s cybersecurity posture while preventing, detecting, and responding to cyber threats. A SOC is staffed by IT security professionals who oversee the entire IT infrastructure of an organization, ensuring 24/7 vigilance over networks, systems, and applications. The team is responsible for the orchestration of cybersecurity functions, which includes maintaining an inventory of all assets and security tools, performing routine maintenance, and developing incident response plans

Policy Development plays a critical role in shaping the framework that governs an organization’s protection of data and information systems. From policy design, to implementation, to enforcement, this capability sets the strategic direction of an organization’s information security program, ensuring it is robust, up-to-date, and effective in mitigating security risks.

A Security Operations Center (SOC) is a centralized unit that continuously monitors and improves an organization’s cybersecurity posture while preventing, detecting, and responding to cyber threats. A SOC is staffed by IT security professionals who oversee the entire IT infrastructure of an organization, ensuring 24/7 vigilance over networks, systems, and applications. The team is responsible for the orchestration of cybersecurity functions, which includes maintaining an inventory of all assets and security tools, performing routine maintenance, and developing incident response plans

Whether you need a couple of hours per day, a couple of days per week, or a couple of weeks per month, Fractional CISO Services provides a dynamic and affordable way to get the experienced services that you need.