Search for:
  • Advisory
  • Assurance
  • Tax



How Can I Protect My Company from Cybersecurity Risks?

The cybersecurity landscape is constantly evolving. Hackers are increasingly professional and adept—striving to develop at a faster pace than cybersecurity experts. They leverage top-end hardware and software to compromise data and financial security at companies both large and small.   In addition, these threat actors are consistently targeting one of the largest vulnerabilities present in every organization – people.

Never has the protection of data been more important, and the threats against it more present. Cyber breaches not only affect an organization’s bottom line but can negatively impact its reputation and brand.

Cherry Bekaert’s Information Assurance & Cybersecurity practice is comprised of professionals that are well-versed in information security, cyber risks and mitigation strategies.

We help strengthen your organization with a comprehensive program of security technology, services and insurance. We customize your solution based on your specific needs and risks, as well as your line of business, industry and budget.

“Most often when organizations fall victim to a cyberattack, the vulnerability could have been easily avoided.”

Steven J. Ursillo, Jr., Cherry Bekaert Cyber Leader

Why Choose Cherry Bekaert Cybersecurity Services?

  • Vast experience in rapidly responding to complex threats across a wide range of networks
  • Adept at identifying and deterring advanced and persistent threats
  • Technology-enabled capabilities illuminating risk, tracking IP loss, and assessing the cost of remediation

Contact Our Cybersecurity Services Team

Cherry Bekaert’s Cybersecurity Services

  • IT & Cybersecurity Governance, Strategy, Security Planning and Policies & Procedures

    Cherry Bekaert can help to define an enterprise approach for assessing, prioritizing, managing and monitoring security risks. In addition, we help define security risk tolerance posture for our clients and an approach for making cost-benefit decisions with respect to accepting residual security risk. A large part of this is the development or update of information security policies and procedures. These documents serve as a primary element of cybersecurity and are the roadmap for your organization.

  • Security Awareness Training & Program Development

    Security Awareness Training programs are designed to provide users of an organization with appropriate guidance on how to fulfill their security responsibilities before accessing the organization’s information systems, as well as how to identify potential threats and avoid them. Whether you need an assessment of your current program or need help developing one from scratch, our professionals can help across:

    • Program Development & Review
    • Materials Development & Review
    • Policies & Procedures
    • IT General Controls/Foundations
    • Social Engineering & Cyber Awareness
  • Risk & Vulnerability Assessments

    Knowing the ins and outs of your data is paramount to knowing your organization’s security position. Our Cyber Risk Assessments identify, assess and prioritize threats to your organization’s IT, systems, applications and operations. We provide guidance in the areas of:

    • IT Security and Cybersecurity
    • Data Management and Classification
    • Privacy
    • Vendor Management
    • Mergers & Acquisitions
    • Fraud & Forensics
    • Business Impact Analysis (BIA) and/or Disaster Recovery & Business Continuity Planning

    Cherry Bekaert’s IT security specialists assess systems with a combination of open source, commercial and proprietary tools to identify security vulnerabilities of external-facing systems, internal networks, or both. Our procedures are designed to confirm the existence of vulnerabilities and reduce false positives, in addition to defining mitigating solutions.

  • Attack & Penetration Tests/Ethical Hacking

    Threats exist not only from outside the organization, but from within as well. An attack & penetration (A&P) test, also known as “ethical hacking”, is often used to determine not only the feasibility of an attack but the impact should an attack be successful. Tests are conducted by our IT security specialists to mimic how an attacker could exploit security weaknesses across multiple systems within the organization.

  • Readiness Assessments & Advisory Services

    We act as facilitator, interpreter and liaison between our clients, their auditors and their regulating authorities. We can simplify the compliance process and create efficiencies, helping to mitigate risks. We offer support in the following compliance areas:

    • System and Organization Controls (SOC) Services: SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Technical Cybersecurity Assessments
    • NIST CSF/800-53/171 (FISMA/FedRAMP/DFARS/CMMC)
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • Cybersecurity Defense & Response
    • Vendor Management
    • Privacy (GDPR, CCPA, HIPAA)
  • System and Organization Controls (SOC), and Attestation Services

    We provide detailed and thorough System and Organization Controls (SOC) Services attestations. These attest services may be used to provide assurance to applicable stakeholders for financial reporting (SOC 1) or in compliance with operational criteria (SOC 2) as specified by the AICPA Trust Service Criteria. Assurance may also be delivered in the form of other non-traditional attest services. Our group is experienced in:

    • SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Third Party Assurance
    • HITRUST Assessment Services/HIPAA/HITECH
    • Microsoft SSPA Attestation Services
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • FedRAMP/NIST 800-53/NIST 800-171/CMMC
    • Third Party and Shared Assessments
    • Privacy (GDPR, CCPA, HIPAA)
  • IT and Cybersecurity Due Diligence

    Performing cybersecurity due diligence prior to a merger or acquisition should be as routine as verifying financial and legal stewardship. Cyber breaches can drastically decrease the value of a deal, even after the deal closes. Our professionals have years of due diligence experience across:

    • Cybersecurity Governance
    • Administrative, Technical & Physical IT Controls
    • Cyber Liability Coverage
    • Cybersecurity Defense & Response
    • Cybersecurity Compliance
    • Cyber Risk & Vulnerability Assessments
    • Technical Cybersecurity Assessments
  • Cyber Liability Coverage

    Regulatory, legal and notification costs related to a data breach can add up to millions of dollars. Cyberliability insurance coverage can be an effective option to help mitigate that risk. There are a variety of available coverage terms, policy limits and pricing options. Cherry Bekaert Benefits Consulting’s Risk Management Services practice will evaluate your exposure, current policy and identify the most effective and efficient policy option. CBBC, LLC will evaluate:

    • Policy Terms and Premiums
    • Levels of Coverage Relative to Quantified Risk
    • Cyber Risk Transfer Clauses in Customer and Vendors Contracts
Related Thought Leadership
play button
Aug 16
Webinar Recording

Cybersecurity in Education: Regulations, Incidents, and Practical Cons...

Watch Now
Aug 07

SEC Adopts New Cybersecurity Disclosure Rules: What You Need to Know

Learn More
Aug 01

Final CMMC Rule Reaches Critical Milestone

Learn More
Jul 17

Top Risk Factors Facing the Insurance Industry in 2023

Learn More
Jun 26

Cracking the Code Behind Assessing Your Third-Party Risk Management Ex...

Learn More
Jun 14

How Will NIST Special Publication (SP) 800-171, Revision 3 Impact CMMC...

Learn More
Let's Talk

Steven J. Ursillo, Jr.

Cybersecurity Leader

Let's Talk


Information Lifecycle & Data Management Services

We help organizations with Information Lifecycle & Data Management to improve risk management, reduce costs,...

Learn More

Cybersecurity: Compliance, Risk Mitigation & Managed Services

Learn how we can help establish appropriate cybersecurity programs for your business with our Cybersecurity...

Learn More

Cybersecurity Maturity Model Certification (CMMC) Consulting Services

As a CMMC Candidate Certified C3PAO and registered RPO, Cherry Bekaert provides Cybersecurity Maturity Model...

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

Cybersecurity Services

Learn about our Cybersecurity Services & how we assist clients in identifying relevant cybersecurity risks,...

Learn More

Risk Assurance & Advisory Services: Cybersecurity Protection Solutions

Implement customized cyber assessment and methodologies with our cybersecurity solutions to help your organization mitigate...

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

System & Organization Controls SOC 2 Services

Discover our full suite of System and Organization Controls SOC 2 Reporting Services. Let us...

Learn More