Control.
Identity and access management is a cornerstone of enhanced cybersecurity. It enables internal and external individuals to have appropriate access to an organization’s IT resources, thus improving productivity, enhancing the user experience, and most importantly, strengthening the security posture of an organization.
Grant Thornton’s cybersecurity professionals help clients with:
- Access management
- Privileged account management (PAM)
- Identity management
- Identity governance
- Consumer identity and access management
- Auditing and reporting
How can we help you?
Our advisory teams tackle challenges alongside you, designing fresh solutions with a balance of scale, skill and service you’ll only find here.
Our featured insights
Connect with our Advisory leaders
Derek Han
Principal, Cybersecurity and Privacy Leader, Risk Advisory Services
Grant Thornton Advisors LLC
Derek is a Principal in the Advisory Cyber Risk Services Group. Derek has eighteen (18) years of professional experience in information security and IT risk consulting.
Chicago, Illinois
Industries
- Technology, media & telecommunications
Service Experience
- Advisory
Lindsay Hohler
Principal, Cyber Risk
Grant Thornton Advisors LLC
Charlotte, North Carolina
Ready to talk? We’re ready to listen.
Request a meeting and a member of our team will be in touch to see what we can do to meet your needs.
Want to submit an RFP? Please submit your request through our RFP submission page.
How we can help with cybersecurity and privacy
-
-
Cyber defense
Cyber defense -
Grant Thornton managed detection and response
Grant Thornton managed detection and response -
Incident readiness and response
Incident readiness and response -
Privacy and data protection
Privacy and data protection -
Software supply chain security
Software supply chain security -
Strategy and Management
Strategy and Management -
Third party risk
Third party risk