Search for:
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer
Providing You Guidance to Innovate and Grow Your Business
Achieving Success When Selling to the World’s Largest Buyer

COVID-19 Guidance Center

Tax Implications and Financial Business Guidance Regarding the Coronavirus

Tableau and Alteryx Online Training Courses

We’re all about continuous learning and growth. Harness the power of your data.

Employee Retention Credit Tax Services

Expanded Employee Retention Credit (ERC) & how our professionals can assist you.

Services

Cybersecurity

shadow

How Can I Protect My Company from Cybersecurity Risks?

The cybersecurity landscape is constantly evolving. Hackers are increasingly professional and adept—striving to develop at a faster pace than cybersecurity experts. They leverage top-end hardware and software to compromise data and financial security at companies both large and small.   In addition, these threat actors are consistently targeting one of the largest vulnerabilities present in every organization – people.

Never has the protection of data been more important, and the threats against it more present. Cyber breaches not only affect an organization’s bottom line but can negatively impact its reputation and brand.

Cherry Bekaert’s Information Assurance & Cybersecurity practice is comprised of professionals that are well-versed in information security, cyber risks and mitigation strategies.

We help strengthen your organization with a comprehensive program of security technology, services and insurance. We customize your solution based on your specific needs and risks, as well as your line of business, industry and budget.

“Most often when organizations fall victim to a cyberattack, the vulnerability could have been easily avoided.”

Steven J. Ursillo, Jr., Cherry Bekaert Cyber Leader

Why Choose Cherry Bekaert Cybersecurity Services?

  • Vast experience in rapidly responding to complex threats across a wide range of networks
  • Adept at identifying and deterring advanced and persistent threats
  • Technology-enabled capabilities illuminating risk, tracking IP loss, and assessing the cost of remediation

CMMC-AB-Provisional-Assessor

Cherry Bekaert’s Risk & Accounting Advisory Services

  • IT & Cybersecurity Governance, Strategy, Security Planning and Policies & Procedures

    Cherry Bekaert can help to define an enterprise approach for assessing, prioritizing, managing and monitoring security risks. In addition, we help define security risk tolerance posture for our clients and an approach for making cost-benefit decisions with respect to accepting residual security risk. A large part of this is the development or update of information security policies and procedures. These documents serve as a primary element of cybersecurity and are the roadmap for your organization.

  • Security Awareness Training & Program Development

    Security Awareness Training programs are designed to provide users of an organization with appropriate guidance on how to fulfill their security responsibilities before accessing the organization’s information systems, as well as how to identify potential threats and avoid them. Whether you need an assessment of your current program or need help developing one from scratch, our professionals can help across:

    • Program Development & Review
    • Materials Development & Review
    • Policies & Procedures
    • IT General Controls/Foundations
    • Social Engineering & Cyber Awareness
  • Risk & Vulnerability Assessments

    Knowing the ins and outs of your data is paramount to knowing your organization’s security position. Our Cyber Risk Assessments identify, assess and prioritize threats to your organization’s IT, systems, applications and operations. We provide guidance in the areas of:

    • IT Security and Cybersecurity
    • Data Management and Classification
    • Privacy
    • Vendor Management
    • Mergers & Acquisitions
    • Fraud & Forensics
    • Business Impact Analysis (BIA) and/or Disaster Recovery & Business Continuity Planning

    Cherry Bekaert’s IT security specialists assess systems with a combination of open source, commercial and proprietary tools to identify security vulnerabilities of external-facing systems, internal networks, or both. Our procedures are designed to confirm the existence of vulnerabilities and reduce false positives, in addition to defining mitigating solutions.

  • Attack & Penetration Tests/Ethical Hacking

    Threats exist not only from outside the organization, but from within as well. An attack & penetration (A&P) test, also known as “ethical hacking”, is often used to determine not only the feasibility of an attack but the impact should an attack be successful. Tests are conducted by our IT security specialists to mimic how an attacker could exploit security weaknesses across multiple systems within the organization.

  • Readiness Assessments & Advisory Services

    We act as facilitator, interpreter and liaison between our clients, their auditors and their regulating authorities. We can simplify the compliance process and create efficiencies, helping to mitigate risks. We offer support in the following compliance areas:

    • System and Organization Controls (SOC) Services: SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Technical Cybersecurity Assessments
    • NIST CSF/800-53/171 (FISMA/FedRAMP/DFARS/CMMC)
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • HITRUST Services/HIPAA/HITECH
    • Cybersecurity Defense & Response
    • Vendor Management
    • Privacy (GDPR, CCPA, HIPAA)
  • System and Organization Controls (SOC), and Attestation Services

    We provide detailed and thorough System and Organization Controls (SOC) Services attestations. These attest services may be used to provide assurance to applicable stakeholders for financial reporting (SOC 1) or in compliance with operational criteria (SOC 2) as specified by the AICPA Trust Service Criteria. Assurance may also be delivered in the form of other non-traditional attest services. Our group is experienced in:

    • SOC 1, SOC 2, SOC 2+, SOC 3, SOC for Cybersecurity, SOC for Supply Chain
    • Third Party Assurance
    • HITRUST Assessment Services/HIPAA/HITECH
    • PCI, GLBA, ISO 27001 & 27002
    • NIST Cybersecurity
    • FedRAMP/NIST 800-53/NIST 800-171/CMMC
    • Third Party and Shared Assessments
    • Privacy (GDPR, CCPA, HIPAA)
  • IT and Cybersecurity Due Diligence

    Performing cybersecurity due diligence prior to a merger or acquisition should be as routine as verifying financial and legal stewardship. Cyber breaches can drastically decrease the value of a deal, even after the deal closes. Our professionals have years of due diligence experience across:

    • Cybersecurity Governance
    • Administrative, Technical & Physical IT Controls
    • Cyber Liability Coverage
    • Cybersecurity Defense & Response
    • Cybersecurity Compliance
    • Cyber Risk & Vulnerability Assessments
    • Technical Cybersecurity Assessments
  • Cyber Liability Coverage

    Regulatory, legal and notification costs related to a data breach can add up to millions of dollars. Cyberliability insurance coverage can be an effective option to help mitigate that risk. There are a variety of available coverage terms, policy limits and pricing options. Cherry Bekaert Benefits Consulting’s Risk Management Services practice will evaluate your exposure, current policy and identify the most effective and efficient policy option. CBBC, LLC will evaluate:

    • Policy Terms and Premiums
    • Levels of Coverage Relative to Quantified Risk
    • Cyber Risk Transfer Clauses in Customer and Vendors Contracts
Brochures

Information Lifecycle & Data Management Services

We help organizations with Information Lifecycle & Data Management to improve risk management, reduce costs,...

Learn More

Compliance, Risk Mitigation, and Managed Services

Learn about our Cybersecurity Compliance, Risk Mitigation & Managed Services and how we can help...

Learn More

Cybersecurity Maturity Model Certification

Learn how Cherry Bekaert’s Risk Assurance & Advisory Services group can help you identify gaps...

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

Cherry Bekaert Benefits Consulting: Risk Management – Cyber Liability Insurance Programs

Learn More

Risk Assurance & Advisory Services: Cybersecurity

Learn More

Risk Advisory Services: Cyber Protection Solutions

Learn More

Cybersecurity Services for Financial Services Companies

Learn about our Cybersecurity Services for Financial Services Companies and how we can help you...

Learn More

Risk Assurance & Advisory Services: SOC for Cybersecurity

The SOC for Cybersecurity report is designed to assist organizations are they communicate about risk...

Learn More

Risk Assurance & Advisory Services: SOC 2 & SOC 2+ Services

Learn More

Risk Assurance & Advisory Services: SOC 1, 2 & 2+ Audit Service

Learn More

System and Organization Controls SOC 1 Services

Learn more about our System and Organization Controls SOC 1 Services and let us guide...

Learn More
Let's Talk

Steven J. Ursillo, Jr.

Information Assurance & Cybersecurity Leader

Let's Talk

Related Thought Leadership

Featured Alert

Jun 01
Podcast

Impacts and Timing of President Biden’s Executive Order to Improve t...

Learn More

Featured Alert

Jun 01
Article

Executive Order to Improve the Nation’s Cybersecurity: Provisions Re...

Read More

Featured Alert

May 14
Alert

Significant Executive Order to Improve Nation’s Response to Cybersec...

Read More

Featured Alert

Mar 31
Article

Tips to Prepare for a First Cybersecurity Maturity Model Certification...

Read More

Featured Video

play button
Mar 05
Webinar Recording

The Path to Cybersecurity Maturity Model Certification (CMMC)

Watch Now

Featured Alert

Feb 15
Podcast

Part IV: How to Prepare for a CMMC C3PAO Assessment for Certification

Learn More