Cybersecurity

  1. Article
    Business meeting at conference table with professionals walking by
  1. Jeff Krull

    Jeff Krull

    CPA, CISA, CITP

    Principal

  2. Mike Cullen

    Mike Cullen

    CISA, CISSP, CIPP/US

    Principal

  3. Emily Di Nardo

    Emily Di Nardo

    CPA, CITP, HITRUST CHQP

    Principal

  4. Baker Tilly Professional

    Matt Gilbert

    CISA, CRISC, CMMC

    Principal

  5. Garrett Gosh

    Garrett Gosh

    CPA, CITP

    Principal

  6. Madhu Maganti

    Madhu Maganti

    CPA, CISA, M.S.

    Principal

  7. Brian Nichols

    Brian Nichols

    CISSP, CIPP/US

    Principal

  8. Joe Shusko

    Joe Shusko

    CISA, PMP

    Principal

  9. Christopher J. Tait

    Christopher J. Tait

    MBA, CISA, CCSK, CFSA

    Principal

  10. Bosco Yuen

    Bosco Yuen

    CPA, CISSP, CISA, CIA, CSX, CCSA, PMP

    Principal

Organizations need an accurate and objective view of their cybersecurity profile to safeguard information assets and protect the organization's value.

    Proactively protect and address your cybersecurity and information technology (IT) risks.

    Information assets and technology investments left ungoverned and unprotected leave organizations vulnerable to compromise and loss of reputation, revenue/value, customers and intellectual property. Couple these risks with the increasing demands for transparency, accountability and compliance by regulators, government entities, shareholders and others, and you have a perfect storm of risks.

    While sophisticated hacking is a valid threat to organizations, it is rarely the root cause of a data breach. The vast majority of data breaches and cybersecurity incidents are actually caused by a breakdown of basic cybersecurity processes and controls.

    Baker Tilly’s cybersecurity specialists work with organizations to assess their risk and achieve measurable security enhancements and cybersecurity control improvements. We will evaluate your cybersecurity controls, deliver recommended improvements and provide assurance that your cybersecurity controls are working.

    Cybersecurity Awareness Month - 2024

    Explore recent Baker Tilly cybersecurity thought leadership and events to help your organization mitigate cybersecurity risks by achieving measurable security enhancements and control improvements.

    Connect with a Baker Tilly cybersecurity specialist

    • Week one
    • Week two
    • Week three
    • Week four
    • Week five

    Guide

    Ransomware prevention guide

    Provide leading cybersecurity practices to stay ahead of ever-evolving ransomware threats.

    Webinar

    CMMC: How to pick an assessor

    Baker Tilly CMMC specialists will discuss the role of the C3PAO, lead assessor and assessment team, and explore key considerations and critical questions to ask when selecting a C3PAO.

    Webinar

    In the SOClight: Exploring the hottest topics of SOC reporting

    Baker Tilly SOC specialists will provide actionable insights to tackle key challenges and requirements when preparing for a SOC examination.

    Article

    AI: How to manage cybersecurity and data governance risks

    In the ever-evolving world of AI, your organization has many elements to consider. In this article, Baker Tilly cybersecurity specialists recommend initial steps to establish AI governance.

    Guide

    Cyber resilience: A guide to navigating modern risks

    In this guide, Baker Tilly cybersecurity specialists elaborate on leading cybersecurity practices and a checklist of questions to strengthen your cyber resiliency. 

    Our solutions

    Our clients count on our proactive, experienced guidance to manage cyber risk, helping them win now and anticipate tomorrow.

    • Cybersecurity and IT assessments
    • Cybersecurity and privacy compliance

    Cybersecurity and privacy compliance

    Certifications​

    Privacy compliance assessments​

    Security compliance assessments​

    We are making great headway on security policies, procedures and it’s measurable. Our exposed surface area for cyber-attack is smaller than it’s ever been.
    Director of Information Systems for a large insurance company

    © 2024 Baker Tilly US, LLP