Search for:
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer

COVID-19 Guidance Center

Tax Implications and Financial Business Guidance Regarding the Coronavirus

Federal Tax Reform: Opportunity Zones

Community Revitalization by Rewarding Private Investment

Section 199A Deduction for Pass-Through Entities

A Deduction of Up to 20% of Qualified Business Income

Services

Cybersecurity

shadow

How Can I Protect My Company from Cybersecurity Risks?

The cybersecurity landscape is constantly evolving. Hackers are increasingly professional and adept—striving to develop at a faster pace than cybersecurity experts. They leverage top-end hardware and software to compromise data and financial security at companies both large and small.   In addition, these threat actors are consistently targeting one of the largest vulnerabilities present in every organization – people.

Never has the protection of data been more important, and the threats against it more present. Cyber breaches not only affect an organization’s bottom line but can negatively impact its reputation and brand.

Cherry Bekaert’s Information Assurance & Cybersecurity practice is comprised of professionals that are well-versed in information security, cyber risks and mitigation strategies.

We help strengthen your organization with a comprehensive program of security technology, services and insurance. We customize your solution based on your specific needs and risks, as well as your line of business, industry and budget.

“Most often when organizations fall victim to a cyberattack, the vulnerability could have been easily avoided.”

Steven J. Ursillo, Jr., Cherry Bekaert Cyber Leader

Why Choose Cherry Bekaert Cybersecurity Services?

  • Vast experience in rapidly responding to complex threats across a wide range of networks
  • Adept at identifying and deterring advanced and persistent threats
  • Technology-enabled capabilities illuminating risk, tracking IP loss, and assessing the cost of remediation

Cherry Bekaert’s Risk Assurance & Advisory Services

  • IT & Cybersecurity Governance, Strategy, Security Planning and Policies & Procedures

    Cherry Bekaert can help to define an enterprise approach for assessing, prioritizing, managing and monitoring security risks. In addition, we help define security risk tolerance posture for our clients and an approach for making cost-benefit decisions with respect to accepting residual security risk. A large part of this is the development or update of information security policies and procedures. These documents serve as a primary element of cybersecurity and are the roadmap for your organization.

  • Security Awareness Training & Program Development

    Security Awareness Training programs are designed to provide users of an organization with appropriate guidance on how to fulfill their security responsibilities before accessing the organization’s information systems, as well as how to identify potential threats and avoid them. Whether you need an assessment of your current program or need help developing one from scratch, our professionals can help across:

    • Program Development & Review
    • Materials Development & Review
    • Policies & Procedures
    • IT General Controls/Foundations
    • Social Engineering & Cyber Awareness
  • Risk & Vulnerability Assessments

    Knowing the ins and outs of your data is paramount to knowing your organization’s security position. Our Cyber Risk Assessments identify, assess and prioritize threats to your organization’s IT, systems, applications and operations. We provide guidance in the areas of:

    • IT Security and Cybersecurity
    • Data Management and Classification
    • Privacy
    • Vendor Management
    • Mergers & Acquisitions
    • Fraud & Forensics
    • Business Impact Analysis (BIA) and/or Disaster Recovery & Business Continuity Planning

    Cherry Bekaert’s IT security specialists assess systems with a combination of open source, commercial and proprietary tools to identify security vulnerabilities of external-facing systems, internal networks, or both. Our procedures are designed to confirm the existence of vulnerabilities and reduce false positives, in addition to defining mitigating solutions.

  • Attack & Penetration Tests/Ethical Hacking

    Threats exist not only from outside the organization, but from within as well. An attack & penetration (A&P) test, also known as “ethical hacking”, is often used to determine not only the feasibility of an attack but the impact should an attack be successful. Tests are conducted by our IT security specialists to mimic how an attacker could exploit security weaknesses across multiple systems within the organization.

  • Readiness Assessments & Advisory Services

    We act as facilitator, interpreter and liaison between our clients, their auditors and their regulating authorities. We can simplify the compliance process and create efficiencies, helping to mitigate risks. We offer support in the following compliance areas:

    • System and Organization Controls (SOC) Services: SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Technical Cybersecurity Assessments
    • NIST CSF/800-53/171 (FISMA/FedRAMP/DFARS/CMMC)
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • HITRUST Services/HIPAA/HITECH
    • Cybersecurity Defense & Response
    • Vendor Management
    • Privacy (GDPR, CCPA, HIPAA)
  • System and Organization Controls (SOC), and Attestation Services

    We provide detailed and thorough System and Organization Controls (SOC) Services attestations. These attest services may be used to provide assurance to applicable stakeholders for financial reporting (SOC 1) or in compliance with operational criteria (SOC 2) as specified by the AICPA Trust Service Criteria. Assurance may also be delivered in the form of other non-traditional attest services. Our group is experienced in:

    • SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Third Party Assurance
    • HITRUST Assessment Services/HIPAA/HITECH
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • FedRAMP/NIST 800-53/NIST 800-171/CMMC
    • Third Party and Shared Assessments
    • Privacy (GDPR, CCPA, HIPAA)
  • IT and Cybersecurity Due Diligence

    Performing cybersecurity due diligence prior to a merger or acquisition should be as routine as verifying financial and legal stewardship. Cyber breaches can drastically decrease the value of a deal, even after the deal closes. Our professionals have years of due diligence experience across:

    • Cybersecurity Governance
    • Administrative, Technical & Physical IT Controls
    • Cyber Liability Coverage
    • Cybersecurity Defense & Response
    • Cybersecurity Compliance
    • Cyber Risk & Vulnerability Assessments
    • Technical Cybersecurity Assessments
  • Cyber Liability Coverage

    Regulatory, legal and notification costs related to a data breach can add up to millions of dollars. Cyberliability insurance coverage can be an effective option to help mitigate that risk. There are a variety of available coverage terms, policy limits and pricing options. Cherry Bekaert Benefits Consulting’s Risk Management Services practice will evaluate your exposure, current policy and identify the most effective and efficient policy option. CBBC, LLC will evaluate:

    • Policy Terms and Premiums
    • Levels of Coverage Relative to Quantified Risk
    • Cyber Risk Transfer Clauses in Customer and Vendors Contracts
Brochures

Cybersecurity Maturity Model Certification

Learn how Cherry Bekaert’s Risk Assurance & Advisory Services group can help you identify gaps...

Learn More

Risk Assurance & Advisory Services: Cybersecurity for Financial Service

Learn More

Cherry Bekaert Benefits Consulting: Risk Management – Cyber Liability Insurance Programs

Learn More

Risk Assurance & Advisory Services: Cybersecurity

Learn More

Risk Advisory Services: Cyber Protection Solutions

Learn More

Risk Assurance & Advisory Services: Cybersecurity for Financial Service

Learn More

Risk Assurance & Advisory Services: SOC for Cybersecurity

The SOC for Cybersecurity report is designed to assist organizations are they communicate about risk...

Learn More

Risk Assurance & Advisory Services: SOC 2 & SOC 2+ Services

Learn More

Risk Assurance & Advisory Services: SOC 1, 2 & 2+ Audit Service

Learn More

Risk Assurance & Advisory Services: SOC 1 Services

Learn More
Let's Talk

Steven J. Ursillo, Jr.

Cyber Leader

Let's Talk

Related Thought Leadership

Featured Alert

Nov 04
Podcast

Part II: CMMC and the DFARS Clause Podcast Series

Learn More

Featured Alert

Oct 30
Article

For Manufacturers, There’s No Time to Waste on Cybersecurity

Read More

Featured Alert

Oct 07
Podcast

Part I: Current State of CMMC

Learn More

Featured Alert

Aug 13
Podcast

Not-for-Profit Podcast: Impacted by the Blackbaud Breach? Now What?

Learn More

Featured Video

play button
May 04
Webinar Recording

Cybersecurity Summit 2020

Watch Now

Featured Alert

May 04
Article

DoD Moves Forward with Cybersecurity Maturity Model Certification (“...

Read More