Tailored, laser-focused Cybersecurity solutions to enlighten C-level executives about Cybersecurity preparedness, vulnerabilities and how to respond to incidents. 
See below for the most impactful, current solutions.

Finally: Cybersecurity solutions tailored to even the narrowest of C-level executive concerns

As Cybersecurity professionals, we’ve learned that business executives seek expert Cybersecurity advisory among two dimensions – in this order:

  • Reactively: occurring when they are either facing a breach, real-time, or are suspecting a very damaging condition in their systems – and need help immediately; or
    Proactively: because they recognize they may be under a false sense of security and have a specific risk in mind.

To that end – we’ve developed tailored solutions that are rapid, insightful, impactful and provide deliverables for a very reasonable fee. We categorize these solutions as SL Cyber First Passthey are listed below. We developed them to be most responsive to the Cybersecurity deficiencies that we observe today. Not all of these may apply to your organization – perhaps you are more prepared in some areas and less in others.
Regardless of your Cybersecurity status, we welcome a conversation with you about which of the Cybersecurity risks that SL Cyber First Pass can address are most relevant to your organization. Remember, Cybersecurity is a journey – these solutions help you mature among many dimensions of Cybersecurity defense.

Our CyberFirstPass solutions listed below are each intended to focus on certain key risks that are rampant in the market today. Each can be accomplished in short order. As you review them, consider which might best bring awareness you seek for areas you are most concerned about. Our overall message: Cybersecurity is a journey; you need to start somewhere. In most cases, it’s good to start by learning where you’re most vulnerable.

You outsource your IT and control over your data. Are you sure it's secure?
You're worried a hacker may already be IN your systems, ready to inflict damage.
Your Microsoft 365 environment may well be a source of Cyber risk - really.
You don't have a Cybersecurity Incident Response Plan - but are required to have one….
Your Cyber Insurance application: how accurate is it?
Can your staff identify phishing and other harmful Cyber threats?
You're hacked and need help, NOW
You outsource your IT and control over your data. Are you sure it's secure?

You outsource your IT and primary control over your data. Are you sure it's secure?

CyberFirstPass Solution: IT Services Provider Security and Quality Check
Is your data really secure? How would you know? There are no pre-qualifications for people to be in the IT outsource business (also referred to as Managed Services Providers, or MSP's). Most (not all) are not focused on information security - rather, they are trying to keep your systems running, and printers printing. Most (not all) have very immature information security practices, documentation and controls in place, and even more would fail to comply with established standards for Cybersecurity. Give thought to this: do you know how well your outsource IT provider protects your most sensitive digital assets and data? How do they manage access to your systems among their staff? Where to they store your passwords? How do you know they can detect threats and hacks to your system, before they cause damage?
This CyberFirstPass solution helps assess the level of information security capability actually provided by your outsource provider - and helps you with a gameplan of how to shore it up in the event things aren't in good shape.

You're worried a hacker may already be IN your systems, ready to inflict damage.

You're worried a hacker may already be IN your systems, ready to inflict damage.

CyberFirstPass Solution: Real-time Intrusion Detection Checkup
Whether you're seeing evidence of emails being sent from what looks to be your system, or you're realizing that systems are behaving a bit different than "normal", the current Cyber risk environment is too impactful to simply ignore these things.
This CyberFirstPass solution is designed to analyze certain system attributes and activities and provide you with insights about evidence of intrusion and threat actor presence - as well as recommendations to remediate, where warranted.

Your Microsoft 365 environment may well be a source of Cyber risk - really.

Your business' setup of Microsoft 365 may well be a source of Cyber risk - really.

CyberFirstPass Solution: Vulnerability and Risk Review of Microsoft 365
It's remarkable how many businesses and their IT teams deploy this very powerful set of applications (Outlook, OneDrive, Excel, Word, Sharepoint, Teams, etc.) without knowing the first thing about how exposed they are making their sensitive information. There are so many settings and capabilities - which mature all the time - that without a seasoned knowledge of the settings and controls that impact information security, many business' systems are unknowingly and/or unintentionally exposing information inappropriately and raising hack and threat levels to high degrees.
This CyberFirstPass solution focuses on measuring your specific Microsoft 365 setup against established and recommended guidelines, and to consider where Cybersecurity risks may be most heightened without corrective action. We also provide recommendations for corrective actions so that this risk can be mitigated to the degree you choose to.

You don't have a Cybersecurity Incident Response Plan - but are required to have one….

You don't have a Cybersecurity Incident Response Plan - but are required to have one….

CyberFirstPass Solution: Cyber Incident Response Plan Design or Review
The first hours after a Cyber incident are horrible. Having a plan of what to do at this time is imperative - yet, most businesses don't have one. With a plan, you have the roadmap and tactics to help you mitigate the damage and get you in the right hands to work through the many challenges and external communications ahead. Without one, it's truly chaos and a forensic nightmare. And, more costly, most of the time.
This CyberFirstPass solution works to help you establish, or revise, a Cybersecurity Incident Response Plan. The extent of this work varies depending on the complexity of your business, as well as the regulatory or governance purposes behind the need for such a plan. And, of course, we'll let you know if we sense that the tools and practices that support the plan's success are in a ready state, or not, and if not, we're able to tackle that too in a different engagement.

Your Cyber Insurance application: how accurate is it?

Your Cyber Insurance application: how accurate is it?

CyberFirstPass Solution: Cyber Insurance Application and Capability Review
Insurance carriers are denying Cyber insurance claims due to many reasons, among them: the information provided on the original applications was simply not true or possible. You don't want to be a statistic of having been denied payment on the very costly breach expenses you thought you had covered. Even the most well intentioned executives have been caught relying perhaps too much on the application preparation by their IT teams.
This CyberFirstPass solution enables us to collaborate with you and your systems team to determine whether the application you prepared was completed reasonably. We also can shed light on the things that most larger insurers expect to see from their clients, and provide recommendations where apparent.

Can your staff identify phishing and other harmful Cyber threats?

Can your staff identify phishing and other harmful Cyber threats?

CyberFirstPass Solution: Cyber Awareness and Behavior Education, Training
Your staff need to be aware of their roles and responsibilities in helping your organization combat Cyber threats. Employee cyber behavior and awareness need to be among the highest priorities for your risk management efforts. Yet, many businesses don't provide adequate training nor keep people aware of the threats in today's environment.
This CyberFirstPass solution is designed to allow us to shape a proper awareness and educational experience for your staff, taking into consideration nuances of your business. We can instruct, lead, and recommend ways to train and continue to keep your teams Cyber aware and Cyber defensive.

You're hacked and need help, NOW

You're hacked and need help, NOW

CyberFirstPass Solution: Cyber Breach Response, Triage and Support
In the unfortunate event of your business dealing with a breach, real-time, we can jump in with your team and other professionals to help assess, analyze and support the recovery from these difficult experiences. Of note: active breach management requires a team from inside, and outside your business - including legal advisors and others. 

To get in touch, please fill out the form on this page or email us directly at [email protected]

Click here to learn more about our SL Cybersecurity team and resources

Arrange a confidential conversation with SingerLewak’s Cybersecurity team about SL Cyber First Pass solutions

Name(Required)
Email(Required)
Bob Green

Bob Green

Lead Partner, CPA, CITP, CGMA

Carl Grifka

Carl Grifka

Managing Director, CISSP, CISA, CISM, PMP, CDPSE

Eric Rockwell

Eric Rockwell

Lead Cybersecurity Advisor, CISSP, vCISO

Finally: Cybersecurity solutions tailored to even the narrowest of C-level executive concerns

As Cybersecurity professionals, we’ve learned that business executives seek expert Cybersecurity advisory among two dimensions – in this order:

  • Reactively: occurring when they are either facing a breach, real-time, or are suspecting a very damaging condition in their systems – and need help immediately; or
    Proactively: because they recognize they may be under a false sense of security and have a specific risk in mind.

To that end – we’ve developed tailored solutions that are rapid, insightful, impactful and provide deliverables for a very reasonable fee. We categorize these solutions as SL Cyber First Passthey are listed below. We developed them to be most responsive to the Cybersecurity deficiencies that we observe today. Not all of these may apply to your organization – perhaps you are more prepared in some areas and less in others.
Regardless of your Cybersecurity status, we welcome a conversation with you about which of the Cybersecurity risks that SL Cyber First Pass can address are most relevant to your organization. Remember, Cybersecurity is a journey – these solutions help you mature among many dimensions of Cybersecurity defense.

Our CyberFirstPass solutions listed below are each intended to focus on certain key risks that are rampant in the market today. Each can be accomplished in short order. As you review them, consider which might best bring awareness you seek for areas you are most concerned about. Our overall message: Cybersecurity is a journey; you need to start somewhere. In most cases, it’s good to start by learning where you’re most vulnerable.

You outsource your IT and control over your data. Are you sure it's secure?
You're worried a hacker may already be IN your systems, ready to inflict damage.
Your business' setup of Microsoft 365 may well be a source of Cyber risk - really.
You don't have a Cybersecurity Incident Response Plan - but are required to have one….
Your Cyber Insurance application: how accurate is it?
Can your staff identify phishing and other harmful Cyber threats?
You're hacked and need help, NOW
You outsource your IT and control over your data. Are you sure it's secure?

You outsource your IT and primary control over your data. Are you sure it's secure?

CyberFirstPass Solution: IT Services Provider Security and Quality Check
Is your data really secure? How would you know? There are no pre-qualifications for people to be in the IT outsource business (also referred to as Managed Services Providers, or MSP's). Most (not all) are not focused on information security - rather, they are trying to keep your systems running, and printers printing. Most (not all) have very immature information security practices, documentation and controls in place, and even more would fail to comply with established standards for Cybersecurity. Give thought to this: do you know how well your outsource IT provider protects your most sensitive digital assets and data? How do they manage access to your systems among their staff? Where to they store your passwords? How do you know they can detect threats and hacks to your system, before they cause damage?
This CyberFirstPass solution helps assess the level of information security capability actually provided by your outsource provider - and helps you with a gameplan of how to shore it up in the event things aren't in good shape.

You're worried a hacker may already be IN your systems, ready to inflict damage.

You're worried a hacker may already be IN your systems, ready to inflict damage.

CyberFirstPass Solution: Real-time Intrusion Detection Checkup
Whether you're seeing evidence of emails being sent from what looks to be your system, or you're realizing that systems are behaving a bit different than "normal", the current Cyber risk environment is too impactful to simply ignore these things.
This CyberFirstPass solution is designed to analyze certain system attributes and activities and provide you with insights about evidence of intrusion and threat actor presence - as well as recommendations to remediate, where warranted.

Your business' setup of Microsoft 365 may well be a source of Cyber risk - really.

Your business' setup of Microsoft 365 may well be a source of Cyber risk - really.

CyberFirstPass Solution: Vulnerability and Risk Review of Microsoft 365
It's remarkable how many businesses and their IT teams deploy this very powerful set of applications (Outlook, OneDrive, Excel, Word, Sharepoint, Teams, etc.) without knowing the first thing about how exposed they are making their sensitive information. There are so many settings and capabilities - which mature all the time - that without a seasoned knowledge of the settings and controls that impact information security, many business' systems are unknowingly and/or unintentionally exposing information inappropriately and raising hack and threat levels to high degrees.
This CyberFirstPass solution focuses on measuring your specific Microsoft 365 setup against established and recommended guidelines, and to consider where Cybersecurity risks may be most heightened without corrective action. We also provide recommendations for corrective actions so that this risk can be mitigated to the degree you choose to.

You don't have a Cybersecurity Incident Response Plan - but are required to have one….

You don't have a Cybersecurity Incident Response Plan - but are required to have one….

CyberFirstPass Solution: Cyber Incident Response Plan Design or Review
The first hours after a Cyber incident are horrible. Having a plan of what to do at this time is imperative - yet, most businesses don't have one. With a plan, you have the roadmap and tactics to help you mitigate the damage and get you in the right hands to work through the many challenges and external communications ahead. Without one, it's truly chaos and a forensic nightmare. And, more costly, most of the time.
This CyberFirstPass solution works to help you establish, or revise, a Cybersecurity Incident Response Plan. The extent of this work varies depending on the complexity of your business, as well as the regulatory or governance purposes behind the need for such a plan. And, of course, we'll let you know if we sense that the tools and practices that support the plan's success are in a ready state, or not, and if not, we're able to tackle that too in a different engagement.

Your Cyber Insurance application: how accurate is it?

Your Cyber Insurance application: how accurate is it?

CyberFirstPass Solution: Cyber Insurance Application and Capability Review
Insurance carriers are denying Cyber insurance claims due to many reasons, among them: the information provided on the original applications was simply not true or possible. You don't want to be a statistic of having been denied payment on the very costly breach expenses you thought you had covered. Even the most well intentioned executives have been caught relying perhaps too much on the application preparation by their IT teams.
This CyberFirstPass solution enables us to collaborate with you and your systems team to determine whether the application you prepared was completed reasonably. We also can shed light on the things that most larger insurers expect to see from their clients, and provide recommendations where apparent.

Can your staff identify phishing and other harmful Cyber threats?

Can your staff identify phishing and other harmful Cyber threats?

CyberFirstPass Solution: Cyber Awareness and Behavior Education, Training
Your staff need to be aware of their roles and responsibilities in helping your organization combat Cyber threats. Employee cyber behavior and awareness need to be among the highest priorities for your risk management efforts. Yet, many businesses don't provide adequate training nor keep people aware of the threats in today's environment.
This CyberFirstPass solution is designed to allow us to shape a proper awareness and educational experience for your staff, taking into consideration nuances of your business. We can instruct, lead, and recommend ways to train and continue to keep your teams Cyber aware and Cyber defensive.

You're hacked and need help, NOW

You're hacked and need help, NOW

CyberFirstPass Solution: Cyber Breach Response, Triage and Support
In the unfortunate event of your business dealing with a breach, real-time, we can jump in with your team and other professionals to help assess, analyze and support the recovery from these difficult experiences. Of note: active breach management requires a team from inside, and outside your business - including legal advisors and others. 

To get in touch, please fill out the form on this page or email us directly at [email protected]

Click here to learn more about our SL Cybersecurity team and resources

Arrange a confidential conversation with SingerLewak’s Cybersecurity team about SL Cyber First Pass solutions

Name(Required)
Email(Required)
Bob Green

Bob Green

Lead Partner, CPA, CITP, CGMA

Carl Grifka

Carl Grifka

Managing Director, CISSP, CISA, CISM, PMP, CDPSE

Eric Rockwell

Eric Rockwell

Lead Cybersecurity Advisor, CISSP, vCISO