Find Your Specialist


Contact Us

    Find a Specialist


    Analyzing Procedures for Protecting Sensitive Data

    As one of the most pressing concerns in today’s C-suite, cybersecurity continues to make headlines with data breaches and the devastating consequences for businesses. The FD cybersecurity team works with organizations of all sizes, across all industries, to address concerns in guarding consumer and employee data, proprietary information and infrastructure.

    Our cybersecurity professionals can help you:

    • Assess the current state of your cybersecurity program
    • Compare your cybersecurity program and related risks to industry benchmarks
    • Develop an actionable roadmap to progress from the current-state of your program to a customized, maintainable future-state

    Utilizing the AICPA’s proposed framework, our teams can evaluate your company’s cyber risk management.

    FD Cybersecurity Assessment Methodology

    We leverage a combination of established frameworks and standards, customized for your organization’s risks, needs and requirements, including:

    • National Institute of Standards and Technology (NIST)
    • Federal Information Security Management Act of 2002 (FISMA)
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Healthcare Information Trust Alliance (HITRUST)
    • Payment Card Industry (PCI) Security Standards Council
    • Federal Financial Institutions Examination Council (FFIEC)
    • SOC Examinations
    • International Organization for Standards (ISO) 27001/2
    • Control Objectives for Information and Related Technology (COBIT)

    Understanding the NIST Framework

    We utilize the industry-specific profiles of the National Institute of Standards and Technology (NIST) Cybersecurity Framework to assess the state of your cybersecurity. This framework was developed in 2014 in the wake of an Executive Order issued by President Obama, and it provides a set of industry standards and best practices to help organizations better manage cybersecurity risks.

    The Framework consists of:

    • 5 Core Functions (Identify, Protect, Detect, Respond, Recover)
    • 22 categories within those functions
    • 98 subcategories
    • 4 tiers to determine current state maturity
    • Profiles that are specific to industries

    Podcast | Culture of Compliance: Managing Cyber Risk: Understanding the NIST Control Framework

    Find a Specialist

    Privacy Overview

    When you use or access the Site, we use cookies, device identifiers, and similar technologies such as pixels, web beacons, and local storage to collect information about how you use the Site. We process the information collected through such technologies, which may include Personal Information, to help operate certain features of the Site (e.g., to prevent online poll participants from voting more than once), to enhance your experience through personalization, and to help us better understand the features of the Site that you and other users are most interested in.

    You can enable or disable our use of cookies per category.
    Always Enabled

    Essential cookies enable you to navigate our Site and use certain features, such as accessing secure areas of our Site and using other features of our service that require us to keep track of certain information as you navigate from page to page. Although some of these cookies are “required” to enable certain functionality, you can disable them in the browser, but doing so will limit your ability to use the features supported by such cookies.

    Functionality cookies are cookies that support features of the Site, such as remembering your preferences.

    These cookies collect information about how you use our Site, including which pages you go to most often and if they receive error messages from certain pages. These cookies are only used to improve how our Site functions and performs.

    From time-to-time, we may engage third parties that track individuals who visit our Site. These third parties may track your use of the Site for purposes of providing us with certain marketing automation features (to help us improve our outreach to current and prospective clients) and providing you with targeted advertisements.