Solidify.
A solid cyber defense is a cornerstone of your risk management, and we can help you plan, implement and maintain preventative measures that protect and adapt in the face of evolving attacks.
Grant Thornton’s cyber security program solutions include:
- Vulnerability assessment
- Penetration testing
- Scenario-based cyber testing
- Cyber incident tabletops and incident response
- Cyber defense technology implementation
- Managed cyber analytics (MCA) services
How can we help you?
Our advisory teams tackle challenges alongside you, designing fresh solutions with a balance of scale, skill and service you’ll only find here.
Our featured insights
No Results Found. Please search again using different keywords and/or filters.
Connect with our Advisory leaders
John Pearce
Principal, Cyber Risk, Risk Advisory Services
Grant Thornton Advisors LLC
John is a Principal with Grant Thornton Cyber Risk Advisory Services. John has twenty (20) years of professional experience conducting number of large scale engagements in the following areas: security program strategy and implementation, security operations capability maturity and development, advanced intrusion analysis and cyber remediation.
Arlington, Virginia
Industries
- Insurance
- Technology, media & telecommunications
- Transportation & distribution
- Banking
Service Experience
- Advisory
Ready to talk? We’re ready to listen.
Request a meeting and a member of our team will be in touch to see what we can do to meet your needs.
Want to submit an RFP? Please submit your request through our RFP submission page.
How we can help with cybersecurity and privacy
-
-
Identity and access management
Identity and access management -
Grant Thornton managed detection and response
Grant Thornton managed detection and response -
Privacy and data protection
Privacy and data protection -
Incident readiness and response
Incident readiness and response -
Strategy and Management
Strategy and Management -
Software supply chain security
Software supply chain security -
Third party risk
Third party risk