• Skip to primary navigation
  • Skip to main content
Dean Dorton – CPAs and Advisors
  • Services
        • Audit & Assurance
          • Audits, Reviews & Compilations
          • ESG Programs & Reporting
          • Internal Audit
          • International Financial Reporting
          • Lease Accounting Managed Services
          • Peer Review Services
          • SOC Reporting
        • Family Office
        • Consulting & Advisory
          • Business Valuation Services
          • Forensic Accounting
          • Litigation Support
          • Matrimonial Dissolution
          • Merger & Acquisition
          • SEC Services
          • Succession Planning
          • Transaction Advisory Services
          • Whistleblower Hotline
        • Outsourced Accounting
        • Private Wealth
        • Healthcare Consulting
          • Finance
          • Health Systems Operational Transformation
          • Medical Billing and Credentialing
          • Risk Management & Compliance
          • Strategy and Strategy Implementation
          • Technology & Data Analytics
        • Tax
          • Business Tax
          • Cost Segregation Studies
          • Credits and Incentives
          • Estates and Trusts
          • Individual Tax
          • International Tax
          • SEC Provision and Compliance
          • State and Local Tax
        • Technology & Cybersecurity
          • Accounting Software
          • Cybersecurity
            • Cybersecurity Assessments
            • Cybersecurity Scorecard Assessment
            • Security Awareness Training
            • Virtual Information Security Office
          • Data Analytics & AI
          • IT Audit & Compliance
            • Cybersecurity Maturity Model Certification (CMMC)
            • Data Privacy Laws
            • SOC Reporting
          • IT Infrastructure & Cloud Solutions
            • Automation
            • Backup and Disaster Recovery
            • Cloud Strategy
            • Data Center
            • Enterprise Network
            • Network Security
            • Phone and Video Conferencing
            • User Identity Management Solutions
            • Webex
          • Managed IT Services
  • Industries
        • Construction
        • Distilleries and Craft Breweries
        • Energy and Natural Resources
        • Equine
        • Financial Institutions
        • Government
        • Healthcare
        • Higher Education
        • Life Sciences
        • Manufacturing and Distribution
        • Nonprofit
        • Real Estate
  • Insights
    • Articles
    • Guides
    • Case Studies
  • Events
  • Company
        • News
        • Our Team
        • Experiences
        • Careers
          • College Students
          • Experienced Professionals
        • Locations
        • Lexington, KY

          250 West Main Street
          Suite 1400
          Lexington, KY 40507
          859-255-2341

        • Louisville, KY

          435 North Whittington Parkway
          Suite 400
          Louisville, KY 40222
          502-589-6050

        • Louisville, KY

          700 North Hurstbourne Parkway
          Suite 115
          Louisville, KY 40222
          502-589-6050

        • Cincinnati, OH

          312 Walnut Street
          Suite 3330
          Cincinnati, OH 45202
          859-331-3300

        • Blue Ash, OH

          9987 Carver Rd
          Suite 120
          Blue Ash, OH 45242
          513-891-5911

        • Ft. Wright, KY

          810 Wright’s Summit Parkway
          Suite 300
          Fort Wright, KY 41011
          859-331-3300

        • Indianapolis, IN

          5975 Castle Crk Pkwy Dr N
          Suite 400
          Indianapolis, IN 46250
          317-469-0169

        • Raleigh, NC

          4130 Parklake Avenue
          Suite 400
          Raleigh, NC 27612
          919-782-9265

  • Contact Us
ServicesTechnology & CybersecurityCybersecurityCybersecurity Assessments

How confident are you that your digital assets are adequately protected?

Dean Dorton’s cybersecurity assessment services provide your organization with specific information about the state of your cybersecurity posture.

Request Info
Cybersecurity Assessments

Our approach and services

Dean Dorton’s cybersecurity assessment services provide your organization with specific information about the state of your cybersecurity posture and validate that key controls are working as expected. We offer a variety of services to accommodate any of your requirements, network architecture, and business scenarios.

Our methodology follows project management best practices so at any point in time during the project you know its status, the next steps, and when you will receive your security assessment report.

External Security Assessment

Cybersecurity Scorecard

(Best Value: Learn More)

External & Internal Security Assessment

Adversarial Threat Emulation/ Penetration Testing

Advanced Persistent Tiger Teaming

Description Review your Internet-facing assets for known vulnerabilities and weaknesses Provides high-level risk metrics to help your small business understand exposure to todays most common malware threats Detailed technical audit of your enterprise environment designed to identify and eliminate  weaknesses and risks Customizable threat emulation services designed to accomplish specific goals set during scoping Continuous threat emulation and penetration testing services proactively hunting threats before the adversary can find them
Options N/A N/A
  • External security
  • Social engineering
  • Network security
  • Endpoint security
  • User security
  • Active directory security
  • Communications security
  • Security operations
  • Cloud security
  • Blackbox penetration test
  • Graybox penetration test
  • Road warrior penetration test
  • Compromised workstation penetration test
  • Web application penetration test
  • MITRE ATT&CK® techniques
  • External attack surface monitoring
  • Reactive testing blocks
  • Modules from external/internal testing and adversarial threat emulation services
Program Maturity ⚪ ⚪ ⚪⚪ ⚪⚪⚪⚪ ⚪⚪⚪⚪⚪
Coverage 🔘 ⚪⚪⚪ ⚪⚪⚪⚪⚪ ⚪⚪ ⚪⚪⚪⚪⚪
Threat Capability 🐞 🐞🐞 🐞🐞🐞 🐞🐞🐞 🐞🐞🐞🐞

Program maturity scale

Where does your organization fall on the scale?

1

BEGINNING

The most common security controls are in place (password policy, AV)

No dedicated or assigned security specific responsibilities

No security control framework

No proactive testing

No talk organizationally of security status or planning

2

PLANNING

Basic security controls exist, but are not complemented with proper processes and trained personnel

Annual testing is conducted

Security responsibilities are assigned to an individual as a secondary role

Security Control Framework identified, but not implemented

Organizational support for security exists (budgets exist or are being developed, leaders desire updates)

3

MANAGING

Security Control framework has been identified and is implemented

Controls are managed by trained personnel with enough resources to proactive manage controls

Sufficient funds are placed into budgets for cybersecurity people, training, and tools

Organization conducts regular vulnerability testing, and at least annual third party testing

Metrics and key performance indicators for critical cybersecurity aspects are tracked and reported to organizational leaders

4

PREVENTING

Organization proactively conducts risk assessments/vulnerability scans in change process

Organization adopts a whitelisting approach to key access control lists

Dedicated security analysts are enlisted to proactively threat hunt and identify risks

Organization establishes normal baselines of operation and can identify anomalous activity

Organization provides role specific cybersecurity training to non-cybersecurity staff

5

LEADING

Organization establishes framework for generating and sharing threat intelligence produced by cybersecurity program

Organization develops and shares custom innovation security solutions

Threat capability scale

We assess your cyber risk against a range of threats.

SCRIPT KIDDIE

An unskilled threat actor, working usually individual, that uses public exploit code for known vulnerabilities (sometimes years old) to gain unauthorized access to systems or data. Resources are typically very limited and motivations are typically ego-centric.

ACTIVIST

Threat actors (generally skilled) working individually or in small groups (with individual specializations) that use common techniques and exploits to gain unauthorized access to systems or data. Resources are limited and motivations are based in principled beliefs (which means threat actors will dedicate more time and effort at specific targets).

ORGANIZED CRIME

Skilled threat actors working in specialized groups to achieve economies of scale on returns. These threat actors employ common tools, tactics, and techniques, but also may include the use of 0-day exploits. Leveraging a larger array of resources to conduct attacks, organized crime cyberattacks, the motive of this threat actor is typically financial. They are highly motivated.

STATE-AFFILIATED

Highly skilled threat actors working in groups (and sometimes contracting with commercial organizations and products) with nearly unlimited resources, state-affiliated threat actors often are on the leading edge of developing 0-day exploits and new tools, tactics, and techniques to bypass security controls. Motivations are typically geo-political advantage (gathering intelligence), a key objective is to remain undetected.

INDUSTRIES
Construction Distilleries and Craft Breweries Energy and Natural Resources Equine Financial Institutions Healthcare Higher Education Manufacturing and Distribution Nonprofit Real Estate
Insights
TRENDING
SUBSCRIBE EXPLORE
dorton Here’s How Much You Can Expect Outsourcing Accounting to Cost
Here’s How Much You Can Expect Outsourcing Accounting to Cost
Read
dorton Kentucky Cities and Counties – ACT NOW to Get Cybersecurity Grants
Kentucky Cities and Counties – ACT NOW to Get Cybersecurity Grants
Read
dorton New Market Leaders Announced for Top Southeast Business Advisory Firm
New Market Leaders Announced for Top Southeast Business Advisory Firm
Read
dorton The Indispensable Value of Outsourced Accounting to a CFO
The Indispensable Value of Outsourced Accounting to a CFO
Read
Today

Let’s Redefine Your Success, Together.

LET'S TALK
PAY INVOICE SUBMIT RFP
  • Services
    • Outsourced Accounting
    • Audit & Assurance
    • Tax
    • Consulting & Advisory
    • Technology & Cybersecurity
    • Family Office
    • Wealth Management
  • Industries
  • Company
  • Locations
  • Careers
  • Insights
  • Events
  • Contact Us
SUBSCRIBE TO INSIGHTS
email Dean Dorton - CPAs And Advisors On Email facebook Dean Dorton - CPAs And Advisors On Facebook twitter twitter linkedin Dean Dorton - CPAs And Advisors On LinkedIn youtube Dean Dorton - CPAs And Advisors On YouTube

The matters discussed on this website provide general information only. The information is neither tax nor legal advice. You should consult with a qualified professional advisor about your specific situation before undertaking any action.

© 2026 Dean Dorton Allen Ford, PLLC. All Rights Reserved

  • Privacy Policy
  • Terms Of Use
  • Accessibility