Darrin Maggy, CISSP
Information Security Operations Manager
Integris
Darrin Maggy is the Information Security Operations Manager for Integris’ vCISO program. A CISSP with over 25 years of experience in IT, Darrin provides leadership and oversight to the fractional CISO team – helping clients strengthen their security posture through expert guidance and strategic risk management.
Why a fractional CISO is a strategic advantage for SMBs
Could outsourced, fractional CISO (chief information security officer) services (sometimes referred to as vCISO) be one of the hottest growth areas in IT? The numbers would suggest so. According to…
Read MoreLaw Firm Cybersecurity Audits: How to Prepare for Your Client Questionnaire
If you run a law firm, chances are you know the drill. You’re about to get a new corporate client, and soon after you’ve signed your agreement, you get the…
Read MoreRetainers for vCIOs and vCISOs: A Comprehensive Guide
If you’re running an IT department at a small to mid-size company, you know— the demands on your infrastructure are greater than ever. Cyber threats are growing at an alarming…
Read MorePreparing Your IT Team To Work With A vCISO: A Step-By-Step Guide
A vCISO can change your cybersecurity posture for the better—if you have the right teamwork and processes in place. Here’s what to do.
Read MoreWhen Do We Need a vCISO?
According to recent reports from CIO magazine, cybersecurity is still the number one concern in keeping IT managers up at night. With historically high labor shortages for cybersecurity talent, you…
Read MoreEmbracing ISO 27001: A Blueprint for Information Security Excellence
Information is one of the most valuable assets a business can possess. With the increasing frequency and sophistication of cyber threats, protecting sensitive data has become a top priority for…
Read MoreCybersecurity Plans, Policies, and Procedures: A Guide
The proliferation of cyber threats has underscored the critical importance of robust cybersecurity measures for organizations and industries. As cybercriminals evolve and adapt their tactics, protecting sensitive data, critical systems,…
Read MoreFive Ways to Build a Business Culture Around Cybersecurity
Building a business culture around a strong cybersecurity plan is important. Here are five things you can do at your workplace.
Read More