Enterprise technology is a strategic enabler for many organizations that rely on information technology to communicate critical information, achieve efficiencies, and stay competitive.

We help clients maximize the effectiveness of their information technology assets: people, process, and technology. Ungoverned and unprotected, those assets are vulnerable to a variety of threats that reduce an organization’s ability to meet its objectives. We work with our clients to help reduce that risk to acceptable levels, helping clients to manage their technology investments to ensure that they are secure, reliable, and effective in meeting the needs of the organization. Our dedicated information technology risk professionals have provided cybersecurity, technology consulting, and assurance services to numerous clients across multiple industries. Our services include:

  • Cybersecurity
  • Security assessments (external/internal)
  • Customer/end user satisfaction
  • HITRUST assessments
  • IT operations management
  • Project management
  • IT governance
  • IT process assurance
  • Infrastructure stability
  • Organizational efficiency
  • Business continuity planning/disaster recovery
  • E-discovery

Insurers required to provide cybersecurity information by April 27, 2015 to the New York Department of Financial Services

On March 26, Superintendent Benjamin Lawsky of the New York Department of Financial Services (NYDFS) issued a letter spelling out a requirement for insurers to provide information related to their cybersecurity programs by April 27. The letter states that the information requested will be used to perform a risk assessment for future inspection activities. The short response time may indicate the great sense of urgency and importance that the State of New York is placing on this initiative.

Learn more >

Implementing an effective cybersecurity management program

The best-prepared companies are shifting their cybersecurity strategies from prevention, to implementing techniques that quickly detect breaches and limit the damage once a breach has been confirmed. What are the effective components of a modern cybersecurity management program?

Five main components to cybersecurity effectiveness >

Our Take

image of

"We work with clients to help maximize the effectiveness of IT and protect information assets from the variety of technology risks and threats that exist today."

— Tom Wojcinski