Services
Cybersecurity Professional Services
Regulatory Compliance Risk
-
CMMC/NIST/DFARS/RMF/NERC
-
Mock Compliance Assessments/Audits
-
Policies, Plans, and Procedures
Cybersecurity Threat Risk
-
Risk Assessment
-
Penetration Testing
-
Vulnerability Analysis
-
Insider Threat Analysis
Information Security Risk
-
Cybersecurity Program Management
-
Disaster Recovery/Business Continuity
-
Cybersecurity Staffing Services
-
Cybersecurity Systems Integration
-
Microsoft 365 Migration/Implementation
Cybersecurity Maturity Model Certification (CMMC)
Assessment Services
KNC Strategic Services is a Candidate Certified Third Party Assessment Organization (C3PAO) Through The CMMC-AB
We are actively supporting the Defense Industrial Base and Defense Supply Chain as it prepares for the up and coming CMMC Assessments





Have a CISO when you need a CISO, don't pay for one when you don't need one
For most small and medium businesses, especially in the defense industrial base, having a full-time Chief Information Security Officer (CISO) is not feasible, affordable, or possible. This is where the Virtual CISO, or vCISO, offers great value.
Led by Chuck Buresh, our EVP and COO, Chuck is a Certified CISO (CCISO), with substantial experience. Chuck leads our team of vCISOs that support our clients.
vCISOs function much like a fractional airline. You have a set amount of hours available, and only use them when you need them. Our vCISOs have experience in, and offer expertise in the following:
- Governance, Risk, Compliance
- Governance
- Risk Management
- Compliance Oversight
- Information Security Controls and Audit Management
- Information Security Management Controls
- Audit Management
- Security Program Management & Operations
- Security Program Management
- Security Program Operations
- Information Security Core Competencies
- Access Control
- Social Engineering, Phishing Attacks, Identity Theft
- Physical Security
- Disaster Recovery and Business Continuity Planning
- Firewall, IDS/IPS, and Network Defense Systems
- Wireless Security
- Virus, Trojans and Malware, and Other Malicious Code Threats
- Secure Coding Best Practices and Securing Web Applications
- OS Hardening
- Encryption Technologies
- Vulnerability Assessment and Penetration Testing
- Threat Management
- Incident Response and Computer Forensics
- Strategic Planning, Finance, Procurement, and Third-Party Management
- Strategic Planning
- Finance
- Third-Party Management
Source: EC-Council Certified Chief Information Security Officer (CCISO)
Want to learn more about our team and our vCISO service? Fill out the form below and contact us.