Brochure

Risk Assurance & Advisory Services: Navigating Federal IT Compliance

calendar iconMarch 21, 2019
Download Brochure

What Do All These Acronyms Really Mean?

Speaking and understanding the language of information technology (“IT”) with all its acronyms and buzzwords is hard enough. But throw in the Federal Government, the inventor of all things acronym, and before you know it, you are swimming in a sea of letters. Whether you’re a tech company going after your first government contract in a request for proposal (“RFP”) process or a well-seasoned government contractor, ensuring your systems are compliant is paramount.

Key Insight: Being proactive about compliance can mean the difference between winning and losing Federal contracts.

Having your systems assessed by an independent party can help:

  • Identify any gaps in need of remediation
  • Strengthen internal controls
  • Expedite the RFP

Other Risk Factors

Using systems that aren’t adequately designed to meet Federal compliance requirements can result in potentially losing contracts or existing ones being terminated. While some contracts may require compliance prior to award, others will only require that the awardee be in a “ready state” or that compliance be met within a given timeframe from the date of award. In addition, periodic reassessments of systems are often required throughout the life of a contract to demonstrate an ongoing state of compliance.

Our Capabilities

Cherry Bekaert’s IT Audit Group can help ensure compliance with various Federal Government regulatory requirements and provide insights to leverage IT controls to reduce costs and gain competitive advantage in the following areas:

  • FISMA
  • NIST 800-53, 800-37, 800-30 and 800-171
  • CMMC
  • OMB A-123 and A-130
  • FedRAMP
  • FISCAM
  • FIPS 199/200

Our IT assurance professionals have years of consulting and audit experience in the public sector, which is complemented by professional accreditations, such as:

  • Certified Information Systems Auditor (“CISA”)
  • Certified Information Systems Security Professional (“CISSPA”)
  • Certification Ethical Hacker (“CEH”)
  • Certified Internal Auditor (“CIA”)
  • Certified in Risk & Information System Controls (“CRISC”)
  • Certified Fraud Examiner (“CFE”)

What You Can Expect

Positioning your company to meet the demands of the Federal Government is critical. Being able to sleep at night knowing your systems have been assessed by an independent party is just as important. When you work with Cherry Bekaert on your own system readiness assessment, you’ll get action-oriented plans designed to help you remediate issues and successfully pass an audit required to be awarded a contract.