Darrin Maggy headshot

Darrin Maggy, CISSP

Information Security Operations Manager
Integris

Darrin Maggy is the Information Security Operations Manager for Integris’ vCISO program. A CISSP with over 25 years of experience in IT, Darrin provides leadership and oversight to the fractional CISO team – helping clients strengthen their security posture through expert guidance and strategic risk management.

fractional CISO

Why a fractional CISO is a strategic advantage for SMBs

Could outsourced, fractional CISO (chief information security officer) services (sometimes referred to as vCISO) be one of the hottest growth areas in IT? The numbers would suggest so. According to…

Read More
law firm cybersecurity audit

Law Firm Cybersecurity Audits: How to Prepare for Your Client Questionnaire 

If you run a law firm, chances are you know the drill. You’re about to get a new corporate client, and soon after you’ve signed your agreement, you get the…

Read More
Person preparing to sign a retainer document.

Retainers for vCIOs and vCISOs: A Comprehensive Guide

If you’re running an IT department at a small to mid-size company, you know— the demands on your infrastructure are greater than ever. Cyber threats are growing at an alarming…

Read More
A group of people, whose hands are visible, are collaborating to assemble a jigsaw puzzle on a wooden table. The puzzle pieces, scattered around, are being picked up and arranged by various hands, indicating teamwork and cooperation. Much like the vCISO role in cybersecurity, everyone is pitching in to create the complete picture.

Preparing Your IT Team To Work With A vCISO: A Step-By-Step Guide

A vCISO can change your cybersecurity posture for the better—if you have the right teamwork and processes in place. Here’s what to do.

Read More
what is data governance?

When Do We Need a vCISO?

According to recent reports from CIO magazine, cybersecurity is still the number one concern in keeping IT managers up at night. With historically high labor shortages for cybersecurity talent, you…

Read More
Close-up of a computer keyboard with a white key labeled "ISO 27001" in red text, emphasizing the importance of this information security standard. The surrounding keys are visible, showcasing a typical QWERTY layout.

Embracing ISO 27001: A Blueprint for Information Security Excellence

Information is one of the most valuable assets a business can possess. With the increasing frequency and sophistication of cyber threats, protecting sensitive data has become a top priority for…

Read More
A red queen chess piece is prominent in the foreground on a chessboard, contrasting with silver chess pieces blurred in the background on a black backdrop. The image highlights the uniqueness and significance of the red queen amid the standard silver pieces.

Cybersecurity Plans, Policies, and Procedures: A Guide

The proliferation of cyber threats has underscored the critical importance of robust cybersecurity measures for organizations and industries. As cybercriminals evolve and adapt their tactics, protecting sensitive data, critical systems,…

Read More
A document titled "National Cybersecurity Strategy" lies on a yellow surface, accompanied by a pen.

Five Ways to Build a Business Culture Around Cybersecurity

Building a business culture around a strong cybersecurity plan is important. Here are five things you can do at your workplace.

Read More