Search for:
SBA 8(a) Business Development Program Consulting Services
Cybersecurity Maturity Model Certification (CMMC)
Providing You Guidance to Innovate and Grow Your Business
Government Contractor Consulting Services
Healthcare Industry M&A Report: What We Saw in 2021 and What’s Ahead
Cannabis Accounting, Tax & Business Advisory Services
Providing You Guidance to Innovate and Grow Your Business
Government Contractor Consulting Services
Providing You Guidance to Innovate and Grow Your Business
Government Contractor Consulting Services
General Data Protection Regulation (GDPR) for Higher Education Institutions
Government Contractor Consulting Services
2021 US Middle-Market Private Equity Report
Advisory, Accounting & Tax Services for Special Purpose Acquisition Companies (SPACs)
Risk Management Consulting Services for the Financial Services Industry
Government Contractor Consulting Services
Providing You Guidance to Innovate and Grow Your Business
Government Contractor Consulting Services
Providing You Guidance to Innovate and Grow Your Business
Government Contractor Consulting Services

COVID-19 Guidance Center

Tax Implications and Financial Business Guidance Regarding the Coronavirus

Transaction Advisory Services

Helping businesses navigate financial due diligence engagements and domestic and cross-border transactions.

Employee Retention Credit Tax Services

Expanded Employee Retention Credit (ERC) & how our professionals can assist you.

Services

Cybersecurity

shadow

How Can I Protect My Company from Cybersecurity Risks?

The cybersecurity landscape is constantly evolving. Hackers are increasingly professional and adept—striving to develop at a faster pace than cybersecurity experts. They leverage top-end hardware and software to compromise data and financial security at companies both large and small.   In addition, these threat actors are consistently targeting one of the largest vulnerabilities present in every organization – people.

Never has the protection of data been more important, and the threats against it more present. Cyber breaches not only affect an organization’s bottom line but can negatively impact its reputation and brand.

Cherry Bekaert’s Information Assurance & Cybersecurity practice is comprised of professionals that are well-versed in information security, cyber risks and mitigation strategies.

We help strengthen your organization with a comprehensive program of security technology, services and insurance. We customize your solution based on your specific needs and risks, as well as your line of business, industry and budget.

“Most often when organizations fall victim to a cyberattack, the vulnerability could have been easily avoided.”

Steven J. Ursillo, Jr., Cherry Bekaert Cyber Leader

Why Choose Cherry Bekaert Cybersecurity Services?

  • Vast experience in rapidly responding to complex threats across a wide range of networks
  • Adept at identifying and deterring advanced and persistent threats
  • Technology-enabled capabilities illuminating risk, tracking IP loss, and assessing the cost of remediation

Cherry Bekaert’s Risk & Accounting Advisory Services

  • IT & Cybersecurity Governance, Strategy, Security Planning and Policies & Procedures

    Cherry Bekaert can help to define an enterprise approach for assessing, prioritizing, managing and monitoring security risks. In addition, we help define security risk tolerance posture for our clients and an approach for making cost-benefit decisions with respect to accepting residual security risk. A large part of this is the development or update of information security policies and procedures. These documents serve as a primary element of cybersecurity and are the roadmap for your organization.

  • Security Awareness Training & Program Development

    Security Awareness Training programs are designed to provide users of an organization with appropriate guidance on how to fulfill their security responsibilities before accessing the organization’s information systems, as well as how to identify potential threats and avoid them. Whether you need an assessment of your current program or need help developing one from scratch, our professionals can help across:

    • Program Development & Review
    • Materials Development & Review
    • Policies & Procedures
    • IT General Controls/Foundations
    • Social Engineering & Cyber Awareness
  • Risk & Vulnerability Assessments

    Knowing the ins and outs of your data is paramount to knowing your organization’s security position. Our Cyber Risk Assessments identify, assess and prioritize threats to your organization’s IT, systems, applications and operations. We provide guidance in the areas of:

    • IT Security and Cybersecurity
    • Data Management and Classification
    • Privacy
    • Vendor Management
    • Mergers & Acquisitions
    • Fraud & Forensics
    • Business Impact Analysis (BIA) and/or Disaster Recovery & Business Continuity Planning

    Cherry Bekaert’s IT security specialists assess systems with a combination of open source, commercial and proprietary tools to identify security vulnerabilities of external-facing systems, internal networks, or both. Our procedures are designed to confirm the existence of vulnerabilities and reduce false positives, in addition to defining mitigating solutions.

  • Attack & Penetration Tests/Ethical Hacking

    Threats exist not only from outside the organization, but from within as well. An attack & penetration (A&P) test, also known as “ethical hacking”, is often used to determine not only the feasibility of an attack but the impact should an attack be successful. Tests are conducted by our IT security specialists to mimic how an attacker could exploit security weaknesses across multiple systems within the organization.

  • Readiness Assessments & Advisory Services

    We act as facilitator, interpreter and liaison between our clients, their auditors and their regulating authorities. We can simplify the compliance process and create efficiencies, helping to mitigate risks. We offer support in the following compliance areas:

    • System and Organization Controls (SOC) Services: SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Technical Cybersecurity Assessments
    • NIST CSF/800-53/171 (FISMA/FedRAMP/DFARS/CMMC)
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • HITRUST Services/HIPAA/HITECH
    • Cybersecurity Defense & Response
    • Vendor Management
    • Privacy (GDPR, CCPA, HIPAA)
  • System and Organization Controls (SOC), and Attestation Services

    We provide detailed and thorough System and Organization Controls (SOC) Services attestations. These attest services may be used to provide assurance to applicable stakeholders for financial reporting (SOC 1) or in compliance with operational criteria (SOC 2) as specified by the AICPA Trust Service Criteria. Assurance may also be delivered in the form of other non-traditional attest services. Our group is experienced in:

    • SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Third Party Assurance
    • HITRUST Assessment Services/HIPAA/HITECH
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • FedRAMP/NIST 800-53/NIST 800-171/CMMC
    • Third Party and Shared Assessments
    • Privacy (GDPR, CCPA, HIPAA)
  • IT and Cybersecurity Due Diligence

    Performing cybersecurity due diligence prior to a merger or acquisition should be as routine as verifying financial and legal stewardship. Cyber breaches can drastically decrease the value of a deal, even after the deal closes. Our professionals have years of due diligence experience across:

    • Cybersecurity Governance
    • Administrative, Technical & Physical IT Controls
    • Cyber Liability Coverage
    • Cybersecurity Defense & Response
    • Cybersecurity Compliance
    • Cyber Risk & Vulnerability Assessments
    • Technical Cybersecurity Assessments
  • Cyber Liability Coverage

    Regulatory, legal and notification costs related to a data breach can add up to millions of dollars. Cyberliability insurance coverage can be an effective option to help mitigate that risk. There are a variety of available coverage terms, policy limits and pricing options. Cherry Bekaert Benefits Consulting’s Risk Management Services practice will evaluate your exposure, current policy and identify the most effective and efficient policy option. CBBC, LLC will evaluate:

    • Policy Terms and Premiums
    • Levels of Coverage Relative to Quantified Risk
    • Cyber Risk Transfer Clauses in Customer and Vendors Contracts
Related Thought Leadership
May 19
Article

Going Global: Laying the Foundation for Growth in International Market...

Read More
May 11
Article

Are You Ready For Enhanced Cybersecurity SEC Reporting Requirements?

Read More
May 11
Article

Why Private Equity Funds Must Pay Attention to Ransomware Attacks at E...

Read More
May 06
Podcast

Taking a Closer Look at the New SEC Cybersecurity Proposed Rule Change...

Learn More
Mar 21
Podcast

How Airports Can Build and Maintain a Cybersecurity Incident Response ...

Learn More
Feb 17
Article

Understand Which TSA Security Directives Must be Submitted by Airports...

Read More
Let's Talk

Steven J. Ursillo, Jr.

Information Assurance & Cybersecurity Leader

Let's Talk

Brochures

Information Lifecycle & Data Management Services

We help organizations with Information Lifecycle & Data Management to improve risk management, reduce costs,...

Learn More

Cybersecurity: Compliance, Risk Mitigation & Managed Services

Learn how we can help establish appropriate cybersecurity programs for your business with our Cybersecurity...

Learn More

Cybersecurity Maturity Model Certification (CMMC) Consulting Services

As a CMMC Candidate Certified C3PAO and registered RPO, Cherry Bekaert provides Cybersecurity Maturity Model...

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

Cherry Bekaert Benefits Consulting: Risk Management – Cyber Liability Insurance Programs

Learn More

Cybersecurity Services

Learn about our Cybersecurity Services & how we assist clients in identifying relevant cybersecurity risks,...

Learn More

Risk Assurance & Advisory Services: Cybersecurity Protection Solutions

Implement customized cyber assessment and methodologies with our cybersecurity solutions to help your organization mitigate...

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

System & Organization Controls SOC 2 Services

Discover our full suite of System and Organization Controls SOC 2 Reporting Services. Let us...

Learn More

System and Organization Controls SOC 1 Services

Learn more about our System and Organization Controls SOC 1 Services and let us guide...

Learn More