Skip to Content
streaks

Cybersecurity

Plante Moran Logo

FTC updates the GLBA Safeguards and Privacy Rules. Are you compliant?

FTC updates the GLBA Safeguards and Privacy Rules. Are you compliant?

FTC updates the GLBA Safeguards and Privacy Rules. Are you compliant?

Cybersecurity shouldn’t feel like a rollercoaster ride

Do you ever feel upside down or in the dark when it comes to cybersecurity? Even with controls in place, do you feel anxious?

We know it’s difficult to protect your clients and customers, your data, and your staff while staying aware of new threats — and new regulations. That’s why we’ve established a security methodology that addresses everything from risk assessment, prevention, and recovery to the full development of response procedures and security policies. We look at your entire cyberstructure — the people, process, and technology — to help your organization stay off the rollercoaster.

SHOW MORE

Our Unique Advantage

Our cybersecurity leaders are on the forefront of industry trends and regulations. They’re frequently asked to share their knowledge with national and regional publications, and they’re often invited to speak at local and national events, such as the ICBA Annual Conference and the North American International Cyber Summit.

Our diverse staff members have earned more than 10 high-level certifications, including CISA, CISM, CEH, CISSP, CRISC, CCSK, and more. We’re one of only 32 nationally approved HITRUST assessors, also accredited to provide PCI and ISO services.

Managing risk

Managing risk: Protecting people and data
5 min read
Data protection 101: Why you need security awareness training
Your organization has anti-virus software, firewalls, and intrusion detection systems. Isn’t this enough to protect your vital information? The simple answer is no.
Raj Patel
Article June 25, 2019 5 min read
Minimizing your risk of GAAP-related post-close disputes
Brian Lappen
Article October 25, 2019 4 min read
Surviving sea change: Why some businesses sink and others stay afloat
Jason Winters
Article November 19, 2019 5 min read

Seven Point Cybersecurity assessment
Seven specific areas to evaluate how you're protecting your information

Cybersecurity Thought Leadership

  • Medical device security: Don’t put patient care at risk
    Advances in medical devices can improve patient care, but they often lack critical cybersecurity controls and carry risks to patients and healthcare organizations alike. Here are four steps to help your organization mitigate them.
    Article January 7, 2020 1 min read
    Doctor working on medical device
  • Turning risk into opportunity: Five questions to ask
    Organizations make themselves vulnerable to risk in ways you may not have thought about. Are you vulnerable? Ask yourself these five questions.
    Doug Farmer Troy Snyder Jack Kristan
    Article December 20, 2019 8 min read
    Risk
  • GLBA Safeguards Rule updated: FTC defines “financial institutions”
    You may not define your company as a financial institution, but the FTC may regarding the GLBA Safeguards Rule and the Privacy Rule. We discuss the released updates and what can be a complex road to compliance.
    Colin Taggart Emily Fletcher
    Article November 21, 2019 3 min read
    Three people looking at a computer screen
  • Three disruptive technologies poised to shake up the insurance industry
    The insurance industry won’t be immune to disruptive technology, as certain applications are continuing to expand to companies all over the country. Prepare now to use blockchain, artificial intelligence, and other technology. Read more at IASA eInterpreter.
    Terry Olejnik Sarah Pavelek Natalie Pintar
    Article September 23, 2019 6 minute read
    Photo of disruptive technology

People come first

People. Process. Technology. There’s a reason people come first. Our cyber team — touching every industry — is composed of process and technology experts. But it’s our people who can offer your people the peace of mind they depend on.

For nearly 30 years, we’ve been building lasting relationships — with each other and with our clients. Our experts take the time to understand your processes and your systems. This means we do more than protect you from the threats you’re aware of. By taking a holistic view of your organization, we protect you from the threats you haven’t even considered.

This is something Raj Patel, our cybersecurity practice leader, knows firsthand. “I’m incredibly proud of how our diverse team always comes together in the pursuit of a common goal: our clients’ security. By getting to know each unique client, we’re able to deliver solutions that help clients rest at night.”

Our clients say

We began using Plante Moran’s IT security consultants on a SAS 70 project (now called SOC) shortly after we started our company. Their consultants gained our trust and we have used them on SOC projects each year since. We have expanded our relationship with Plante Moran over the years and have worked with them on various network Security, audit, & tax projects as well. Plante Moran’s teams are professional and thorough and we enjoy working with them.

Matthias Horch Co-founder, Secure-24

Graphs and charts depicting data analytics information and insights.
3 min read
Analytics framework improves efficiencies and provides valuable insights

A new analytics framework helps a medical research university improve their ePHI user access security and analysis and create operational efficiencies to focus on value-add risk mitigation activities.

Chris Moshier
Case Study April 2, 2019 3 min read
Building stair with sunrise
1 min read
Global company prevents audits and retains business with SOC 1 reporting
Global transaction processing conglomerate reduces client audits and creates proactive SOC reports.
Tim Bowling
Case Study August 1, 2017 1 min read

How can we help your business?

Submit an RFP