Cybersecurity
Proactively protect and address your cybersecurity and information technology (IT) risks.
Information assets and technology investments left ungoverned and unprotected leave organizations vulnerable to compromise and loss of reputation, revenue/value, customers and intellectual property. Couple these risks with the increasing demands for transparency, accountability and compliance by regulators, government entities, shareholders and others, and you have a perfect storm of risks.
While sophisticated hacking is a valid threat to organizations, it is rarely the root cause of a data breach. The vast majority of data breaches and cybersecurity incidents are actually caused by a breakdown of basic cybersecurity processes and controls.
The Baker Tilly team provides comprehensive cybersecurity services to help organizations assess cyber risk, implement measurable security enhancements and improve control effectiveness. We will evaluate your cybersecurity controls, deliver recommended improvements and provide assurance that your cybersecurity controls are working.
Our solutions
Our clients count on our proactive, experienced cybersecurity services to manage cyber risk, helping them win now and anticipate tomorrow.

Cybersecurity and IT assessments
SOC reporting
- SOC 1®, SOC 2® and SOC 3®
- SOC for Cybersecurity
- SOC readiness assessment
Cybersecurity assessments
- CIS Critical Security Controls (CSC) assessment
- Microsoft Supplier Security & Privacy Assurance Program (Microsoft SSPA)
- New York State Department of Financial Services (NYSDFS)
- National Institute for Standards and Technology (NIST) 800-171
- National Institute for Standards and Technology (NIST) CSF 2.0
- National Institute for Standards and Technology (NIST) 800-53
- Penetration testing assessment
International Organization for Standardization (ISO) certifications
- ISO 27000 family
- ISO 27701
- ISO 22301
- ISO 42001
- ISO 9001
Payment Card Industry Data Security Standard (PCI DSS)
- PCI DSS
- PCI SAQ
- Approved Scanning Vendor (ASV)
Federal assessments
- Cybersecurity Maturity Model Certification (CMMC)
- The Federal Risk and Authorization Management Program (FedRAMP)
- Government Risk and Authorization Management Program (GovRAMP, formerly StateRAMP)
Healthcare assessments
- Health Insurance Portability and Accountability Act (HIPAA)
- HITRUST®
International standards
- BSI Cloud Computing Compliance Criteria Catalog (C5)
Privacy compliance assessments
- General Data Protection Regulation (GDPR)
- California Consumer Privacy Act (CCPA)
IT assurance
- IT SOX compliance
- IT SOX readiness
- IT SOX – PCAOB
- IT internal audit – ERM
- IT internal audit – general IT
- IT internal audit – risk assessment
- IT ESG
- IT GRC – SOD
- IT ERP – NetSuite
- IT ERP – Oracle
- IT ERP – SAP

Cybersecurity advisory
- AI governance advisory
- IT and cybersecurity internal audit solutions
- Federal assessment advisory
- Third-party vendor risk management
- Vulnerability assessment
- Technology due diligence
- Cyber incident response planning and business continuity














































