Resource Library

Resources for IT, Cyber, AI and Compliance Leaders

A working library from Petronella Technology Group: deep guides, hard-won blog lessons, free assessments, on-demand training, and reference frameworks. Built by practitioners who run a Raleigh-based MSP, MSSP, and CMMC Registered Practitioner Organization since 2002.

CMMC Registered Practitioner Org|BBB A+ Since 2003|23+ Years in the Triangle

Most resource pages are link dumps. This one is not. Every guide, blog post, and tool below has been used inside real client engagements: ransomware recoveries, CMMC Level 2 readiness assessments, HIPAA security risk assessments, AI workload buildouts, and the slow grind of getting a small business from "we have antivirus" to a defensible, audit-ready security program. If you are an IT director, CIO, compliance lead, or owner-operator trying to make sense of cybersecurity, AI adoption, and regulated industry compliance, start here.

The library is organized by what you are trying to do. If you need a strategic playbook, jump to the featured guides. If you want to learn fast on a specific topic, browse the most-read blog posts. If you need to baseline your current risk, run a free assessment. If you want structured, on-demand learning for your team, see the Training Academy. Use what you need. Skip what you do not. Everything links to deeper coverage when you want it.

A short note on point of view. Petronella Technology Group is a Raleigh-based MSP, MSSP, digital forensics shop, and CMMC Registered Practitioner Organization that has been operating in the Triangle since 2002. Our team holds CMMC-RP credentials across the bench, plus hands-on certifications in network engineering (CCNA), wireless (CWNE), and digital forensics (DFE #604180 for the founder). That background shapes every resource on this page. We do not write speculative thinkpieces about technology we have never deployed. We write about ransomware because we have done the recovery. We write about CMMC because we sit in the gap-assessment chair. We write about private AI because we run the inference servers. The library is opinionated on purpose, because most of the content out there is sponsored and most of the advice out there is generic.

One more thing. Nothing on this page sits behind a wall. There is no email gate on the blog, no credit card on the free tools, and no obligation to talk to a salesperson before you can read a guide. We share these resources because the security baseline of the small-business community is too low, and because we would rather have an educated conversation when a client does call us than spend the first thirty minutes of every prospect call explaining what zero trust actually means. If anything below sparks a question, the easiest path is to call (919) 348-4912 or schedule through the contact page. For a deeper look at downloadable research reports and executive briefs, or our engagement pricing and packages, follow those links.

Training Academy

On-Demand Training and Certification

For teams that want structured learning instead of scattered blog posts. The Petronella Training Academy is a subscription LMS with cohort-style and self-paced tracks across cybersecurity, AI, compliance, and the operating playbook our own MSP runs on.

The Academy works well for three audiences. First, internal IT and security teams that need consistent, role-aligned training instead of cobbling together vendor courses. Second, MSPs and IT services firms that subscribe to the Partner Program for white-label playbooks, sales templates, and the Operator Council. Third, business owners who want their staff trained on phishing resilience, AI safety, and HIPAA basics without the dry e-learning feel.

Tracks include CMMC fundamentals, HIPAA workforce training, private AI deployment, vCISO operations, and the MSP Partner Program for owner-operators of IT service firms. New cohorts launch quarterly. See the catalog and pricing inside the Academy.

Podcast and Video

Podcast Appearances and Video Library

Long-form conversations on cybersecurity, AI, CMMC, and what is actually happening in the regulated mid-market. Use these for background while you commute, or send them to a leadership team that needs context before a strategy call.

Craig Petronella has been a recurring guest on cybersecurity, MSP, and small-business technology shows since the early 2000s, and the YouTube library mirrors the same teaching style as the blog: practical, opinionated, and grounded in what works inside real client engagements. Episodes cover ransomware response, CMMC certification storylines, the AI privacy debate, and post-incident lessons learned. New short-form clips and full-length podcast guest spots are added regularly.

Free Assessments and Tools

Free Tools and Self-Service Assessments

Use these to baseline your current posture in an afternoon. Nothing here requires a sales call or credit card. Each tool is built from the same intake questions our analysts ask during paid assessments, so the output is genuinely useful even if you never become a Petronella client.

Compliance Frameworks

Compliance Framework Reference Library

Deep reference pages on every framework Petronella Technology Group implements end-to-end. Use these as starting points for scoping conversations with your auditor, attorney, or board.

Compliance framework documentation is, frankly, hard to read. The official NIST and CMMC source documents are written for assessors, not for the IT teams who actually have to implement the controls. The reference pages below translate the source material into plain English, group related controls so you can see how they cluster operationally, and flag the controls that consistently cause the most heartburn during real assessments. Use them when scoping a project, drafting a System Security Plan, or briefing a board on what your compliance posture actually means.

If you are working across multiple frameworks (which is most regulated organizations: a defense contractor with healthcare clients, a financial firm processing card data, a research university with both FERPA and CMMC obligations), the CMMC-to-NIST mapping page is the single most useful reference on this site. It shows which controls satisfy multiple frameworks simultaneously, so you do not end up writing five different versions of the same access-control policy.

Industry Resources

Resources by Industry

Every regulated industry has a different threat model, compliance posture, and operational reality. These industry pages collect the guides, blog posts, and assessments most relevant to each sector our team supports.

An IT director at a sixty-bed clinic does not have the same problems as an IT director at a twenty-person law firm or a defense subcontractor manufacturing components for a tier-one prime. They use different software, face different auditors, and worry about different attack patterns. The industry pages below collect the most relevant guides, blog posts, and case-study material for each sector. They are starting points, not exhaustive directories. If you do not see your industry called out specifically, the underlying compliance and security work usually maps to one of the existing pages: most professional services firms find what they need on the law firm and financial services pages, and most public-sector or grant-funded organizations find what they need on the non-profit and education resources.

Get the UnHackable Newsletter

A short, useful weekly note from the Petronella team on what changed in cybersecurity, compliance, and AI for regulated mid-market organizations. No fluff, no recycled vendor news, no daily blast. Read it in three minutes, archive it, move on with your day.

Subscribe to the Newsletter
FAQ

How to Use This Resource Library

A few common questions from IT leaders, compliance officers, and business owners using these resources for the first time.

Where should I start if I am new to all of this?
If you are responsible for IT or security at a small-to-mid-market organization and you are starting from scratch, work through three things in order. First, run the Security Risk Self-Assessment to find out where you stand. Second, read whichever flagship guide matches your top compliance pressure (the CMMC Guide, the HIPAA Guide, or the AI Implementation Guide). Third, schedule a free consultation if you want a Petronella analyst to interpret your assessment results and help you prioritize. None of these steps cost anything.
Are the free assessments and templates actually useful, or are they marketing fluff?
They are the same intake instruments our paid analysts use during the first phase of a real engagement. The 4-Pillar Security Risk Assessment framework, the incident response plan template, and the CMMC checklist all come straight out of client deliverables. We share them because educated buyers make better clients, and because frankly, the security baseline of the small-business community needs to come up. Use them, copy them, modify them for your team. There is no catch.
How do the blog and the flagship guides differ?
The blog is for fast learning on specific topics. Posts are typically 1,500 to 4,000 words and cover one question deeply. The flagship guides (CMMC, HIPAA, AI, and MSP Accelerator) are longer-form, more structured, and meant to be project blueprints you reference repeatedly across an engagement. If you are scoping a body of work, start with the guide. If you are answering a single question or evaluating a single tool, start with the blog.
Can my team use these resources for our own internal training?
Yes. The blog, the guides, and the free templates can be circulated, printed, or referenced inside your organization. For structured curriculum delivered to your team on a recurring basis, the Petronella Training Academy is the formal subscription product. Many MSPs and IT leaders also book a Private Session when they want a working session on a specific topic for their leadership team.
How often is this library updated?
The blog publishes on a weekly cadence with new posts on whatever topic is most active across our client base. Flagship guides are updated whenever the underlying regulation, framework, or technology changes meaningfully (typically two to four major refreshes per year). Compliance framework reference pages track the official NIST, CMMC, and HIPAA publication cycles. Subscribe to the UnHackable Newsletter if you want a weekly summary of what changed.
Do you serve clients outside the Raleigh-Durham area?
Yes. Petronella Technology Group is headquartered in Raleigh, NC at 5540 Centerview Drive, and we provide on-site service throughout the Triangle region (Durham, Chapel Hill, Cary, Apex, Research Triangle Park, and surrounding cities). Managed services, vCISO, CMMC readiness, HIPAA assessments, and private AI work are delivered remotely to clients across the country. Call (919) 348-4912 or use the contact form to talk through your situation.
I am an MSP or IT services firm. Is anything here useful to me?
Quite a bit, actually. The MSP Accelerator Playbook is built specifically for owner-operators of IT service firms, and the MSP Partner Program includes white-label playbooks, sales templates, the Operator Council peer group, and a wholesale path for AI, CMMC, and forensics services your clients are starting to ask for. Many of the blog posts (especially the CMMC and zero-trust vendor comparisons) are written with peer MSPs in mind.
Inside the Guides

What You Actually Get Inside Each Flagship Guide

Every one of our pillar guides is built from client work, not from desk research. Here is exactly what is inside each one, who it is written for, and the decisions it will help you make faster.

The CMMC Compliance Guide is a Registered Practitioner Organization's field manual for the Defense Industrial Base. It opens with a clear explanation of the CMMC 2.0 three-level structure, what changed from CMMC 1.0, and which level you are likely scoped for based on your contract CUI handling. Then it walks through the 110 NIST 800-171 controls grouped into the fourteen families, with notes on which ones consistently cause assessment findings. You will find a CUI scoping worksheet, a System Security Plan outline aligned to the 110 controls, a Plan of Action and Milestones template for documenting remediation, and a vendor-selection section covering C3PAO assessor choice and the supporting tooling. The guide is written for CEOs, CIOs, and IT directors at primes and subs between twenty and five hundred employees. If you are trying to decide whether to self-attest at Level 1, pursue Level 2 certification, or retire from defense work entirely, this guide will help you make that call with eyes open.

The HIPAA Compliance Guide is the practical companion to the Security Rule, Privacy Rule, and Breach Notification Rule. It covers the required and addressable implementation specifications, walks through the full security risk assessment workflow that satisfies the Office for Civil Rights, and lays out the 2026 Security Rule update timeline that many covered entities are still catching up on. Inside the guide you will find annual workforce training standards, encryption and access-control requirements for electronic protected health information, the Business Associate Agreement review checklist, and the incident response decision tree for breach notification. The guide is written for compliance officers, practice administrators, and IT leaders at clinics, practices, hospitals, digital health startups, and business associates. If you have ever had an OCR letter land on your desk and felt unsure whether your documentation would hold up under review, this guide is the thing you want sitting next to your risk register.

The AI Implementation Guide is our most requested download from CTOs and technology directors at regulated mid-market organizations. It answers the one question every technology leader is now being asked by a board or executive team: how do we use AI responsibly, given the data we handle. The guide covers private LLM hosting for sensitive workloads, the build-versus-buy-versus-fine-tune decision framework, hardware sizing for on-premise inference, retrieval-augmented generation for internal document access, model selection across the open-source ecosystem, guardrail design for HIPAA and CFR-controlled data, and the AI governance policies that satisfy both auditors and the board. It is written for CTOs, VPs of Engineering, CIOs, and senior technology leaders at healthcare, defense, finance, legal, and research organizations that cannot send production data to consumer AI products. If your team is under pressure to deploy AI but nobody is sure what the guardrails should look like, start here.

The Forensics Incident Response Playbook is the tactical guide for the worst week of your career. It is built from real ransomware recoveries, business email compromise investigations, SIM swap reversals, and cryptocurrency theft cases our team has worked through. The playbook covers the first-hour evidence preservation steps that preserve your legal options, the chain-of-custody documentation your cyber insurance carrier and attorneys will require, the communications sequencing for employees and customers and regulators, the network forensics workflow for identifying initial access and lateral movement, and the tabletop exercises your leadership team should run before a real incident. It is written for anyone who could conceivably be the first person at your organization to realize something is very wrong. That usually means the IT director, the security officer, the CFO, or the CEO. Reading the playbook before you need it turns the first four hours of an incident from panic into execution.

The MSP Accelerator Playbook is a different animal. Where the other guides are built for clients, this one is built for peer firms. It is the full operating playbook our team uses to run a profitable managed services and managed security practice: the service stack, the pricing tiers, the quarterly business review cadence, the documentation standards that let a new technician ramp in two weeks instead of two months, the referral network structure, and the Operator Council peer-group process that keeps our owner accountable to outside benchmarks. It is for managed services firm owners and leadership teams that want to grow margins without burning out the bench. Reading it will not replace the work, but it will save you a year of trial and error.

Editorial Standards

How Petronella Technology Group Builds Its Resource Library

The goal is not volume. The goal is that every resource on this page reflects work we have actually delivered for a client, a framework we have actually implemented, or an incident we have actually worked through.

Petronella Technology Group was founded in 2002 in Raleigh, NC, and has been operating in the Research Triangle continuously since. Across the team we hold CMMC Registered Practitioner credentials, a CCNA for network engineering, a CWNE for enterprise wireless, and the DFE #604180 digital forensics credential for our founder Craig Petronella. As an organization we are a CMMC-AB Registered Provider Organization (RPO #1449), listed publicly on the Cyber AB member directory, and a Better Business Bureau A+ rated firm continuously since 2003. Those credentials matter because they shape every resource on this page. The CMMC content comes from sitting across the table from real primes and real subs as they prepare for real assessments. The HIPAA content comes from delivering real security risk assessments and then defending the documentation when the Office for Civil Rights asked follow-up questions. The forensics content comes from actual ransomware recoveries, actual wire-fraud reversals, and actual network investigations we have executed on behalf of clients.

Editorially, we try to follow three rules. First, no speculative content. If we have not actually deployed it, advised on it, or recovered from it, we do not write about it as if we have. Second, no vendor-driven conclusions. Our blog post comparing CMMC documentation platforms, our post comparing zero-trust vendors, and our post comparing password managers were all written after actually running the tools side-by-side inside our own environment or for a client project. We are not paid by any of the vendors we cover, and we change our recommendations when the underlying products change. Third, no fabricated statistics. You will not find a cybersecurity-industry "ninety-five percent of breaches are caused by human error" line on this page unless we can point you to the primary source. When we cite a number, we cite where it came from and when it was measured.

Craig's professional background drives the forensics specialty specifically. Inside the broader forensics field we are focused on SIM swap reversal, cryptocurrency theft investigation, pig-butchering scam analysis, ransomware recovery, business email compromise, and network forensics for intrusion investigation. We are not a private investigation firm, we do not run a Cellebrite or Encase mobile-device lab, and we do not handle traditional e-discovery workstreams. When an incident requires those specialties, we coordinate with a trusted partner network while retaining the strategic and forensic role our credentials cover. That scoping shows up in the resource library: the forensics content you will find here is deep on what we do, and honest about what we do not.

Finally, the resource library is updated on a rolling basis, not on a marketing calendar. The blog publishes weekly on whatever topic is most active across our client base that week. Flagship guides are updated whenever the underlying regulation, framework, or technology changes materially. Free tools and assessment templates are refreshed whenever we update the internal version our analysts use on real engagements. If you find content that feels out of date, email craig at petronellatech.com with the URL and we will prioritize the update.

Additional FAQ

More Common Questions

Follow-up questions we hear from IT leaders, compliance officers, and owner-operators after they have spent time inside the resource library.

What is the difference between a CMMC gap assessment and a CMMC readiness review?
A gap assessment is the structured comparison of your current environment against the 110 NIST 800-171 controls, producing a prioritized list of findings and a Plan of Action and Milestones. A readiness review is the deeper pre-assessment engagement that happens after you have remediated the gap-assessment findings and want independent confirmation that you are ready for a C3PAO assessor to arrive. Most organizations need both, sequenced roughly six to nine months apart, before the formal CMMC assessment. The CMMC Compliance Guide walks through the full timeline, and the CMMC framework reference breaks down the control families in more depth.
How do your guides stay current when frameworks and regulations keep changing?
Each flagship guide has an owner on our team who tracks the underlying source material. For CMMC, that is the official Cyber AB and DoD publications plus the Federal Acquisition Regulation updates. For HIPAA, it is the HHS Office for Civil Rights publication cycle and any proposed Security Rule updates. For NIST 800-53 and 800-171, it is the NIST revision cycle itself. When a material change publishes, the owner updates the affected guide and the corresponding framework reference page. Typical cadence is two to four major refreshes per flagship guide per year, plus smaller clarifications in between. If you want to be notified when a guide updates, the UnHackable Newsletter is the easiest way to stay current.
Can I use these resources for internal employee training programs?
Yes, and many clients do. The blog posts, the free downloadable templates, and the flagship guides can all be circulated inside your organization for internal training, lunch-and-learn sessions, new-hire onboarding, or board briefings. For a more structured curriculum delivered on a recurring schedule, the Petronella Training Academy is the formal subscription product with role-aligned tracks for internal IT, security, and compliance teams. For a single leadership working session on a specific topic (private AI deployment, CMMC rollout, HIPAA refresh, incident response tabletop), our Private Sessions are the right fit.
Do you offer any kind of free initial consultation?
Yes. The free fifteen-minute discovery call with Penny, our AI scheduling assistant, is available at (919) 348-4912 or through the contact form. On that call we will ask enough questions to understand your environment, your compliance posture, and your most pressing concern, and point you to the right starting engagement. There is no obligation, no sales pressure, and if the answer is "you are fine where you are, keep reading the library," that is a completely legitimate outcome.
What makes your CMMC work different from the big national consultancies?
Three things. First, we are Registered Practitioner Organization credentialed (RPO #1449), which means we operate under the official Cyber AB framework and are listed in the public member directory. Second, we run a full managed services and managed security practice alongside our CMMC work, so when we recommend a control implementation we can also execute it, which matters a lot to sub-fifty-employee primes that do not have their own full security team. Third, we are local to the Research Triangle in North Carolina, which means our primes in the Fort Bragg corridor, the Research Triangle Park defense ecosystem, and the broader mid-Atlantic defense supply chain can work with us on-site when the assessment requires physical evidence walk-throughs.
I keep seeing "private AI" versus "cloud AI" debates. Which does Petronella Technology Group actually recommend?
The answer is context-dependent, which is why we wrote the Private AI vs Cloud AI comparison and the AI Implementation Guide. For regulated data, we consistently recommend private inference hosted on infrastructure the client controls. For non-sensitive productivity workloads, cloud AI can be the right call. The decision framework is in the guide and reflects the production deployments our team has delivered for clients across healthcare, defense, legal, and research. Short version: if the data would be a problem to expose in a breach, it should not be leaving your environment to query a consumer AI product.
How do I know if the free self-assessments are giving me accurate results?
The self-assessments are the same intake instruments our paid analysts use in the first phase of a real engagement, so the structure and scoring logic are sound. What they cannot replicate is the follow-up questioning an analyst does in a live conversation. So treat the self-assessment results as a strong baseline and a prioritization aid, not as a final audit. If the results look uncomfortable, schedule a free consultation and we will walk through them together. No obligation, no sales script, just a practitioner conversation about what the numbers mean.
Are all of these resources genuinely free, or is there a catch?
Genuinely free. The blog has no email wall. The free tools have no credit card gate. The flagship guides ask for an email so we can send you updates when the guide is refreshed, but the content is delivered immediately and you can unsubscribe at any time. We share these resources because the security baseline of the small-business community needs to come up, and because educated buyers make for better client relationships when they do eventually call us. That is the model.
Get Started

Want a Working Session With a Petronella Analyst?

If you have been through the resources here and want a real conversation about your environment, your compliance pressures, or your AI roadmap, schedule a free consultation. No sales script. Just a working call with a senior practitioner.