Cybersecurity Risk Assessments

  1. Jeff Krull

    Jeff Krull

    CPA, CISA, CITP

    Principal

  2. Mike Cullen

    Mike Cullen

    CISA, CISSP, CIPP/US

    Principal

  3. Emily Di Nardo

    Emily Di Nardo

    CPA, CITP, HITRUST CHQP

    Principal

  4. Baker Tilly Professional

    Matt Gilbert

    CISA, CRISC, CMMC

    Principal

  5. Garrett Gosh

    Garrett Gosh

    CPA, CITP

    Principal

  6. Madhu Maganti

    Madhu Maganti

    CPA, CISA, M.S.

    Principal

  7. Brian Nichols

    Brian Nichols

    CISSP, CIPP/US

    Principal

  8. Joe Shusko

    Joe Shusko

    CISA, PMP

    Principal

  9. Christopher J. Tait

    Christopher J. Tait

    MBA, CISA, CCSK, CFSA

    Principal

  10. Bosco Yuen

    Bosco Yuen

    CPA, CISSP, CISA, CIA, CSX, CCSA, PMP

    Principal

Baker Tilly has a breadth of experience providing cybersecurity risk assessment services to help align organizations' priorities and budgets within their unique threat landscape.

    Top-down risk assessment

    Data analytics, ones and zeroes

    Leaders in every size organization are being asked the tough questions: How secure are we? What is our risk? Are we compliant with the latest regulations? How do we measure our cybersecurity risk? Baker Tilly understands these challenges and will help you develop a proactive approach to security that protects the assets and the services that are most important to your organization.

    Our top-down, risk-based approach

    Baker Tilly’s robust, holistic cybersecurity risk approach will help to strengthen your understanding of the organization’s cybersecurity posture and risk exposure, and provide actionable recommendations to remediate gaps in your cybersecurity program and enhance overall effectiveness of your cybersecurity safeguards. We will comprehensively examine your cybersecurity activities and infrastructure and advise the critical security control, process, technology and governance improvements needed to safeguard the confidentiality, availability and integrity of your data.

    woman analyses cyber risk management program
    On-demand webinar

    Cybersecurity maturity – enhancing your organization’s cyber risk management posture and program

    Baker Tilly cyber specialists discuss how cybersecurity posture can be measured, and how you might determine what is appropriate and adequate for your organization.

    Cybersecurity and IT audit trends

    This series highlights the top cybersecurity and IT audit trends that organizations are currently impacted by and the response mechanisms they can utilize to combat security threats.

    • Top trends overview
    • Building an IT audit team
    • Proactive assurance
    • Program management and governance
    • Third-party risk management

    Top five cybersecurity and IT audit trends that most impact an organization’s ability to respond to today’s challenges

    How to build an effective IT audit team during a time of skilled resourcing shortages

    The rise of proactive assurance, and why it's here to stay

    Elevate your cybersecurity program: Integrating program management and governance

    Vendor-risk management: Evolving a healthy vendor ecosystem