Cybersecurity questions you need to answer

Top Cybersecurity Questions for Leaders

Leadership – including boards, top-level executives, and others – must be constantly aware of and asking questions about their organization's cybersecurity.

Cybersecurity questions to consider

With the number of attacks constantly on the rise, cybersecurity can no longer be an issue for just the IT department. Leadership – including boards, top-level executives, and others – must be constantly aware of and asking questions about their organization's cybersecurity. Here is a list of questions to help you get started.

Top cybersecurity questions for leaders infographic

Questions?

For more information about cybersecurity, contact Brian Johnson using the information below.

Brian Johnson

Senior Vice President
Technology Services

Brian leads the firm's technology services practice where he helps clients achieve measurable performance improvements through the delivery of specialized, competency-based information systems management, assurance, and advisory services. He has extensive experience in information security, network engineering, and solution development, with recognized specializations in governance, risk, control, and related consulting services.

Brian is a member of ISACA (previously known as the Information Systems Audit and Control Association), the Kansas Society of Certified Public Accountants (KSCPA), the American Institute of Certified Public Accountants (AICPA), the AICPA’s Information Management and Technology Assurance (IMTA) Section, and APICS (the Association for Operations Management). He is a Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT), and Certified in Risk and Information Systems Control (CRISC).

Brian is also a Certified Public Accountant (CPA) and a graduate of Wichita State University, where he earned a master's of accountancy and bachelor's in business administration.

Your organization has unique vulnerabilities and security requirements.
See how our professionals can tailor an IT security plan for you.