• Skip to primary navigation
  • Skip to main content
Dean Dorton – CPAs and Advisors
  • Services
    • Audit & Assurance
      • Audits, Reviews & Compilations
      • ESG Programs & Reporting
      • Internal Audit
      • International Financial Reporting
      • Lease Accounting Managed Services
      • Peer Review Services
      • SOC Reporting
    • Consulting & Advisory
      • Business Valuation Services
      • Forensic Accounting
      • Litigation Support
      • Matrimonial Dissolution
      • Merger & Acquisition
      • SEC Services
      • Succession Planning
      • Transaction Advisory Services
      • Whistleblower Hotline
    • Family Office
    • Healthcare Consulting
      • Finance
      • Health Systems Operational Transformation
      • Medical Billing and Credentialing
      • Risk Management & Compliance
      • Strategy and Strategy Implementation
      • Technology & Data Analytics
    • Outsourced Accounting
    • Private Wealth
    • Tax
      • Business Tax
      • Cost Segregation Studies
      • Credits and Incentives
      • Estates and Trusts
      • Individual Tax
      • International Tax
      • SEC Provision and Compliance
      • State and Local Tax
    • Technology & Cybersecurity
      • Accounting Software
      • Cybersecurity
        • Cybersecurity Assessments
        • Cybersecurity Scorecard Assessment
        • Security Awareness Training
        • Virtual Information Security Office
      • Data Analytics & AI
      • IT Audit & Compliance
        • Cybersecurity Maturity Model Certification (CMMC)
        • Data Privacy Laws
        • SOC Reporting
      • IT Infrastructure & Cloud Solutions
        • Automation
        • Backup and Disaster Recovery
        • Cloud Strategy
        • Data Center
        • Enterprise Network
        • Network Security
        • Phone and Video Conferencing
        • User Identity Management Solutions
        • Webex
      • Managed IT Services
  • Industries
    • Construction
    • Distilleries and Craft Breweries
    • Energy and Natural Resources
    • Equine
    • Financial Institutions
    • Healthcare
      • Finance
      • Health Systems Operational Transformation
      • Risk Management & Compliance
      • Medical Billing and Credentialing
      • Strategy and Strategy Implementation
      • Technology & Data Analytics
    • Higher Education
    • Life Sciences
    • Manufacturing and Distribution
    • Nonprofit and Government
    • Real Estate
  • Insights
    • Articles
    • Guides
    • Case Studies
  • Events
  • Company
    • News
    • Our Team
    • Experiences
    • Careers
      • College Students
      • Experienced Professionals
    • Locations
          • Looking for Services
          • Looking for a Job
            • Curious about Dean Dorton
            • An experienced professional
            • A college student or recent graduate
          • A Current Client
            • Contact Us
            • Making a payment
            • All Client Tools
            • Checking on the latest insights
          • Other…
            • Learn More about Dean Dorton
            • Find a contact
            • Request more information
  • Contact Us
ServicesTechnology & CybersecurityCybersecurityCybersecurity Assessments

How confident are you that your digital assets are adequately protected?

Dean Dorton’s cybersecurity assessment services provide your organization with specific information about the state of your cybersecurity posture.

Request Info
Cybersecurity Assessments

Our approach and services

Dean Dorton’s cybersecurity assessment services provide your organization with specific information about the state of your cybersecurity posture and validate that key controls are working as expected. We offer a variety of services to accommodate any of your requirements, network architecture, and business scenarios.

Our methodology follows project management best practices so at any point in time during the project you know its status, the next steps, and when you will receive your security assessment report.

External Security Assessment

Cybersecurity Scorecard

(Best Value: Learn More)

External & Internal Security Assessment

Adversarial Threat Emulation/ Penetration Testing

Advanced Persistent Tiger Teaming

Description Review your Internet-facing assets for known vulnerabilities and weaknesses Provides high-level risk metrics to help your small business understand exposure to todays most common malware threats Detailed technical audit of your enterprise environment designed to identify and eliminate  weaknesses and risks Customizable threat emulation services designed to accomplish specific goals set during scoping Continuous threat emulation and penetration testing services proactively hunting threats before the adversary can find them
Options N/A N/A
  • External security
  • Social engineering
  • Network security
  • Endpoint security
  • User security
  • Active directory security
  • Communications security
  • Security operations
  • Cloud security
  • Blackbox penetration test
  • Graybox penetration test
  • Road warrior penetration test
  • Compromised workstation penetration test
  • Web application penetration test
  • MITRE ATT&CK® techniques
  • External attack surface monitoring
  • Reactive testing blocks
  • Modules from external/internal testing and adversarial threat emulation services
Program Maturity ⚪ ⚪ ⚪⚪ ⚪⚪⚪⚪ ⚪⚪⚪⚪⚪
Coverage 🔘 ⚪⚪⚪ ⚪⚪⚪⚪⚪ ⚪⚪ ⚪⚪⚪⚪⚪
Threat Capability 🐞 🐞🐞 🐞🐞🐞 🐞🐞🐞 🐞🐞🐞🐞

Program maturity scale

Where does your organization fall on the scale?

1

BEGINNING

The most common security controls are in place (password policy, AV)

No dedicated or assigned security specific responsibilities

No security control framework

No proactive testing

No talk organizationally of security status or planning

2

PLANNING

Basic security controls exist, but are not complemented with proper processes and trained personnel

Annual testing is conducted

Security responsibilities are assigned to an individual as a secondary role

Security Control Framework identified, but not implemented

Organizational support for security exists (budgets exist or are being developed, leaders desire updates)

3

MANAGING

Security Control framework has been identified and is implemented

Controls are managed by trained personnel with enough resources to proactive manage controls

Sufficient funds are placed into budgets for cybersecurity people, training, and tools

Organization conducts regular vulnerability testing, and at least annual third party testing

Metrics and key performance indicators for critical cybersecurity aspects are tracked and reported to organizational leaders

4

PREVENTING

Organization proactively conducts risk assessments/vulnerability scans in change process

Organization adopts a whitelisting approach to key access control lists

Dedicated security analysts are enlisted to proactively threat hunt and identify risks

Organization establishes normal baselines of operation and can identify anomalous activity

Organization provides role specific cybersecurity training to non-cybersecurity staff

5

LEADING

Organization establishes framework for generating and sharing threat intelligence produced by cybersecurity program

Organization develops and shares custom innovation security solutions

Threat capability scale

We assess your cyber risk against a range of threats.

SCRIPT KIDDIE

An unskilled threat actor, working usually individual, that uses public exploit code for known vulnerabilities (sometimes years old) to gain unauthorized access to systems or data. Resources are typically very limited and motivations are typically ego-centric.

ACTIVIST

Threat actors (generally skilled) working individually or in small groups (with individual specializations) that use common techniques and exploits to gain unauthorized access to systems or data. Resources are limited and motivations are based in principled beliefs (which means threat actors will dedicate more time and effort at specific targets).

ORGANIZED CRIME

Skilled threat actors working in specialized groups to achieve economies of scale on returns. These threat actors employ common tools, tactics, and techniques, but also may include the use of 0-day exploits. Leveraging a larger array of resources to conduct attacks, organized crime cyberattacks, the motive of this threat actor is typically financial. They are highly motivated.

STATE-AFFILIATED

Highly skilled threat actors working in groups (and sometimes contracting with commercial organizations and products) with nearly unlimited resources, state-affiliated threat actors often are on the leading edge of developing 0-day exploits and new tools, tactics, and techniques to bypass security controls. Motivations are typically geo-political advantage (gathering intelligence), a key objective is to remain undetected.

INDUSTRIES
Construction Distilleries and Craft Breweries Energy and Natural Resources Equine Financial Institutions Healthcare Higher Education Manufacturing and Distribution Nonprofit and Government Real Estate
Insights
TRENDING
SUBSCRIBE EXPLORE
dorton Here’s How Much You Can Expect Outsourcing Accounting to Cost
Here’s How Much You Can Expect Outsourcing Accounting to Cost
Read
dorton Kentucky Cities and Counties – ACT NOW to Get Cybersecurity Grants
Kentucky Cities and Counties – ACT NOW to Get Cybersecurity Grants
Read
dorton New Market Leaders Announced for Top Southeast Business Advisory Firm
New Market Leaders Announced for Top Southeast Business Advisory Firm
Read
dorton The Indispensable Value of Outsourced Accounting to a CFO
The Indispensable Value of Outsourced Accounting to a CFO
Read
Today

Let’s Redefine Your Success, Together.

LET'S TALK
PAY INVOICE SUBMIT RFP
  • Services
    • Outsourced Accounting
    • Audit & Assurance
    • Tax
    • Consulting & Advisory
    • Technology & Cybersecurity
    • Family Office
    • Wealth Management
  • Industries
  • Company
  • Locations
  • Careers
  • Insights
  • Events
  • Contact Us
SUBSCRIBE TO INSIGHTS
email Dean Dorton - CPAs And Advisors On Email facebook Dean Dorton - CPAs And Advisors On Facebook twitter twitter linkedin Dean Dorton - CPAs And Advisors On LinkedIn youtube Dean Dorton - CPAs And Advisors On YouTube

The matters discussed on this website provide general information only. The information is neither tax nor legal advice. You should consult with a qualified professional advisor about your specific situation before undertaking any action.

© 2025 Dean Dorton Allen Ford, PLLC. All Rights Reserved

  • Privacy Policy
  • Terms Of Use
  • Accessibility