GrantThornton - regions

Cybersecurity

We support organisations at every stage of building a secure business

CYBERSECURITY AT GRANT THORNTON

16 years’ experience in business security

We support our clients at all stages of building a secure business. We make IT security management effective and straightforward for the organisations we serve. We develop compliant IT strategies that protect against emerging cyber threats. We help implement security policies and then actively protect client data by thoroughly testing their environment during the maintenance phase. It is not just our job, it is our passion. And that is why we provide the highest level of service.
Get in touch

Business resilience against digital threats

In 2022, the record-breaking year to date, the average weekly number of attacks on organisations worldwide reached over 1,130. Some 40 million URLs were blocked between July and November 2022 alone (according to Acronis data). Leaked or stolen passwords were responsible for almost half of all the reported breaches in the first half of 2022 alone. The world is experiencing a dynamic escalation in the number, type, direction and method of attacks on organisations and individual users.

How can you protect yourself?

Many businesses are still unaware of the risks involved. There are many reasons for this, including the cost of protective solutions, the low risk awareness among employees and the lack of interest in cybersecurity on the part of owners and management. Such businesses are exposed to severe consequences for failing to take appropriate action. To prevent this, the first step is to identify threats and define security priorities, analysing the risks inherent in the organisation’s processes, systems, and people. The next step is to implement safeguards and monitor the level of risk, while building employee awareness of digital threats remains an ongoing effort.

Outsourcing specialist cybersecurity services can help your organisation navigate this process safely and effectively.

What we are good at

The biggest IT challenges currently facing businesses

NIS 2: the revised EU Directive

The new rules should be applied in all EU member states as of 18 October 2024. The Directive significantly expands the range of entities that are subject to regulation and strengthens their obligations with regard to security and business continuity management, placing particular emphasis on supply chain resilience.

See other (in polish)

DORA: the new EU regulation

It applies to regulated financial entities and ICT companies that play a key role in the operation of financial markets across the EU. It is expected to come into force in late 2024 or early 2025.

See other (in polish)

Critical infrastructure protection

Nowadays, everything from light bulbs to boiler controls and power station turbines can be connected to the internet. This, coupled with the current geopolitical situation, means that critical infrastructure is increasingly being targeted by hacking groups, including those linked to national governments. A successful cyberattack on a facility such as a hospital, power station or water supply could jeopardise the stability of the state in a given area.

See other (in polish)

Cybersecurity talent shortage

Demand for cybersecurity specialists has grown exponentially over the past five years, driven by a rise in hacking attacks and the emergence of regulations around the world (e.g. GDPR, DORA, NIS, CCPA) that force market operators to strengthen the security of their services and data processing. Additionally, specialist training courses and degree programmes are only just emerging.

See other (in polish)

To date, we have helped ensure the digital security of the following clients:

WonderMiles

Travel

  • Scope of service

    Web application security testing

Meniga

IT services

  • Scope of service

    Preparation for management system certification to ISO 27001

Biuro Informacji Kredytowej

Accounting & finance

  • Scope of service

    Web application security testing

S&T

IT services

  • Scope of service

    vCISO – maintenance and development of an information security management system

DDB Group

Advertising agency

  • Scope of service

    IT support through body leasing, full IT outsourcing, lease-back of reception and assistant staff

TCHIBO Coffee Service

Manufacturer of coffee and related products

  • Scope of service

    Full IT outsourcing, IT support

Adecco

HR solutions provider

  • Scope of service

    IT support, including body leasing, ongoing resolution of IT issues, infrastructure development

HERKULES

Hire of lifting equipment

  • Scope of service

    Full IT outsourcing

JSW S.A.

Coal producer

  • Scope of service

    Support to internal IT function

Callstack.io

Web development

  • Scope of service

    vCISO – maintenance and development of an information security management system

IT outsourcing and cybersecurity FAQs

  • How can I assess my organisation’s level of cybersecurity?

    We tailor the assessment methods and scope based on your organisation’s size, complexity, and cybersecurity maturity. Typically, this includes analysing and evaluating management processes relating to security and IT, as well as conducting systems security and social engineering tests.

  • What does IT systems security testing entail?

    IT systems security testing involves simulating a hacking attack to identify vulnerabilities by performing the same actions as a malicious attacker would. Unlike in a real attack, however, all potentially dangerous operations are carried out in consultation with the client and implemented in such a way as to demonstrate the feasibility of the attack without causing any damage.

  • How large is your cybersecurity and IT services team?

    Our IT services and cybersecurity management support team consists of over 40 professionals.

  • What is your approach to implementing cybersecurity solutions?

    We begin with a cross-sectional analysis to determine the organisation’s cybersecurity status and protection requirements, as well as the available resources. Based on these findings, we propose mitigation measures and help implement them within the organisation.

Radosław Kaczorek

Expert in IT governance, risk management and information security, with extensive experience as an information systems auditor. From 2005 to 2009, served as President of the ISACA Chapter in Poland. Co-founded the IT systems and security audit departments at KPMG (1998–2004) and Deloitte (2005–2007). Between 2007 and 2012, acted as a juror for the IT Leadership Awards organised by Computerworld. Lecturer in Postgraduate Studies on “Effective Business IT Management” and “Cybersecurity Management” at the Warsaw School of Economics. An active contributor to the INDI Open Astronomy Instrumentation project and creator of controllers for astrophotography devices. Founder of Immusec (now Grant Thornton Technology), a cybersecurity implementation firm operating in Poland and internationally, which joined the Grant Thornton Group on 29 July 2019. Partner at Grant Thornton since 2019.

Adam Woźniak

Adam has over 6 years of experience in cybersecurity and is an expert in risk management and information security. Previously, he spent 6 years involved in financial auditing and internal auditing in the areas of finance, IT, and security within logistics and telecommunications companies. He holds an internal auditor certificate issued by the Institute of Internal Auditors. Since 2023, he has been responsible for the Cybersecurity service line at Grant Thornton Technology, co-creating and developing the portfolio of services available to clients On a day-to-day basis, she supervises the work of accounting teams, making sure that contracts are performed to an appropriate standard. She resolves any emerging issues and verifies documents to be delivered to clients – in compliance with the requirements of Polish and international accounting standards. Responsible for delivering a top-quality outsourcing service to business partners.

Why Grant Thornton?

We support our clients at all stages of building a secure business. We know how to make IT security effective and simple. It is not just our job, it is our passion. And that is why we provide the highest level of service.

  • 60

    people on our team of experts in the fields of IT, security and business continuity

  • 300+

    clients satisfied with our information security and cyber security support

  • 500+

    projects delivered across many sectors and for organisations of all sizes

Request a proposal

Cybersecurity

We will contact you next working day to identify your needs and tailor our sevices to suit them.

Check again! Some characters you used are not allowed.

Invalid format. Write youraddress@domain.com or phone number +XX XXXXXXXXX.

Request contact

Important topics

See all
Information about cookies

1. As part of the website, the Administrator uses cookies to provide services at the highest level, including in a manner tailored to individual needs.
2. Using the website without changing the cookie settings means that cookies will be stored on your terminal device. You can change your cookie settings in your browser at any time.
3. The Administrator uses cookies to identify the website users, to keep statistics for marketing purposes, and to correctly provide other services offered by the website.
4. Cookies, including session cookies, may also provide information about your terminal equipment and the version of the browser you are using. These tasks are carried out for the correct display of content within the Administrator's website.
3. Cookies are short text files. Cookies do not, under any circumstances, allow the personal identification of a website visitor and no information is stored in them that could allow such identification.
A complete list of the cookies we use and information about their purposes is available in our Privacy Policy.