For More Information Contact Daniel J. Desko  at

The sophistication and frequency of cyber-attacks is on the rise. Recent breach reports have outlined the fact that attacks are exploiting security weaknesses faster and easier than ever before and most organizations are not adequately equipped to defend themselves. Schneider Downs can help your organization to be better prepared. We offer a comprehensive set of information technology (IT) security services, including network penetration assessments, network vulnerability assessments, web application security testing, IT security maturity assessments and more. Schneider Downs team of network security specialists, application configuration specialists, implementation consultants and certified information system auditors can assist your organization with an objective assessment, identifying crucial information and key security risks, and assisting with the implementation of industry best-practice security standards to mitigate these risks.

Cybersecurity Services Include the Following:

Cybersecurity Software Solutions:

In addition to providing a wide range of technical and compliance cybersecurity services, Schneider Downs is an authorized reseller for the software solutions listed below.

Service Overviews:

Cybersecurity Resources:

Quick Reference: 10 Must Ask Cybersecurity and Information Security Questions  

How prepared are you for a breach? Are you subject to regulatory regulations with your data? What data does your vendors have access to? These are just a few of the questions organizations need to ask when assessing their cybersecurity and information security readiness. See the full list and recommendations from our team of experts in this quick reference piece.

Whitepaper: 10 Most Common Physical Cybersecurity Threats 

This whitepaper recounts firsthand experiences from our team of cybersecurity experts gleaned from their offensive physical security testing and incident response investigations, and offers best practices to help organizations like yours better understand, identify and mitigate physical security risks.

Whitepaper: 10 Vulnerabilities Hackers Love to Exploit 

Media coverage of data breaches often focus on the impact, but that’s only half the story. Get inside the mind of a hacker and learn about the common underlying circumstances leading to breaches and best practices you can take to protect yourself and your organization from being a target.

Whitepaper: 10 Things Companies Wish They Did Before a Breach

The Schneider Downs cybersecurity team has participated in countless breach response efforts and while each situation is unique, there are common mistakes and trends we continue to see. In an effort to help organizations like yours, our team of cybersecurity experts share the top ten preventive measures overlooked prior to a breach.

Whitepaper: Maximizing the Value of Penetration Testing

One of the primary tools to accomplish assessing an organizations’ cybersecurity strength are regular penetration tests. The coverage and depth of the penetration test varies widely and management must be aware of what constitutes an effective penetration test in order to maximize the value. This whitepaper explores the difference between penetration testing and vulnerability assessments, as well as best practices and helpful tips on selecting testers.

case studies

big problem:
Ransomware attack halted a global manufacturer's operations.
big thinking:
Recover and secure the system – fast – save $1 million in ransom.
big problem:
High tax burden for family-owned franchisor.
big thinking:
Comprehensive planning for a 15% tax reduction.

our thoughts on

Russian Hackers Indicted in Pittsburgh

Two Russian nationals, Maksim Yakubets and Igor Turashev, were indicted in Pittsburgh on December 5th, for involvement in international multimillion-dollar

read more >

Recertification of PA Act 153 Clearances

It’s quickly approaching the time for the recertification of Pennsylvania Act 153 clearances. Clearances are valid for 5 years. Act 153 took effect

read more >

Six Cybersecurity Tips for the Holiday Shopping Season

Ho, ho, ho, hold on before clicking on that link advertising an amazing deal this holiday season. Phishing, that ever-present and ever-growing organizational

read more >

Louisiana Issues Filing Extension After Ransomware Attack

The state of Louisiana became the latest victim of a string of cybersecurity incidents involving government agencies when a ransomware attack impacted

read more >

Conducting an ERM Evaluation

Institutions of higher education face a number of challenges in today’s highly competitive business and social climate: reputational risk, obsolescence,

read more >

Operation Varsity Blues and Internal Audit

When news broke regarding the college admissions scandal back in March, I couldn’t help but think: where were the internal auditors? Thirty-three

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office

One PPG Place, Suite 1700
Pittsburgh, PA 15222
p:412.261.3644     f:412.261.4876

Map of Columbus Office

65 East State Street, Suite 2000
Columbus, OH 43215
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102