IT security

We help clients build resilient business systems
and processes so they can achieve their objectives.

Develop an effective and efficient approach to address your IT threats

AGH's technology services professionals understand it is more than just hackers that pose a threat to your data. We will help you assess and identify your information security risks so they can be effectively managed.

Don't leave your systems and information vulnerable.
Contact us to learn how to better secure your organization.

Information technology security services

Consider who benefits

Any organization using technology, especially for critical business processes or confidential and/or proprietary information

Organizations seeking to manage potential liability or business interruption associated with security or continuity failures, data breaches and privacy loss

Organizations undergoing or which have undergone rapid change or growth

Consider the benefits

Assess, identify and manage business risks related to information technology

Help protect organizational assets and resources

Reduce risk of organizational losses associated with business interruption, privacy violation, data breaches and other security issues

How AGH's IT security services can help your organization

Almost every organization relies on technology, yet few fully understand the inherent risks it brings to their operations. AGH's technology services professionals help you assess and identify your information security risks so they can be effectively managed or mitigated. Our team focuses on evaluating people, information, technology, and facilities and how they relate to critical information assets and the business processes and services they support.

The result is an effective, efficient approach to help you address the greatest IT threats to your organization and its "operational resilience" – the ability to adapt to those risks that affect your core business processes.

Our methodology helps evaluate threats based on the unique vulnerabilities and security requirements of your information assets. It also helps you consider events that might be malicious, accidental, or even the result of a natural disaster.

By prioritizing your mitigation plans using a business-driven, risk-based approach, you will be better prepared to protect your information assets. And, more importantly, you will be better positioned to ensure the resiliency of those processes and services that are most critical to fulfilling your business mission.

cybersecurity-email-series New call-to-action

Contact us to see how we can help protect your information against your unique risks and threats.

Brian Johnson

Senior Vice President
Technology Services

Brian joined AGH in 1992. He leads the firm’s technology services practice where he helps clients achieve measurable performance improvements through the delivery of specialized, competency-based information systems management, assurance, and advisory services. He has extensive experience in information security, network engineering, and solution development, with recognized specializations in governance, risk, control, and related consulting services.

Brian is a member of ISACA (previously known as the Information Systems Audit and Control Association), the Kansas Society of Certified Public Accountants (KSCPA), the American Institute of Certified Public Accountants (AICPA), the AICPA’s Information Management and Technology Assurance (IMTA) Section, and the Association for Supply Chain Management (ASCM). He is a Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT), Certified in Risk and Information Systems Control (CRISC), Certified Data Privacy Solutions Engineer (CDPSE), and Certified in Production and Inventory Management (CPIM).

Brian is also a Certified Public Accountant (CPA) and a graduate of Wichita State University, where he earned Master of Accountancy and Bachelor of Business Administration degrees.