IT Risk Management

IT Risk Management

CBI manages IT security risk and helps ensure your data is secure, compliant, and available.


Learn more about what we do
Featured Blog Post

Featured Blog Post

So Many “Threat Trends” Reports Out There, But There’s Only One ISTR


Read our featured post by our EVP | Business Development, Dave Glenn!


Read Blog Post
CBI Career Opportunities

CBI Career Opportunities

CBI is attracting talented individuals to our dynamic team. Our industry is evolving more rapidly than ever, and at CBI, we are passionate about staying out in front of new innovations and industry challenges. We’re looking for team members with this same drive.


Apply Now
CBI Support

CBI Support

CBI's team of consultants are here to help you with your IT Risk Management needs. From installation to hardware/software configuration, our team is here to support you.


Learn More

Welcome to Creative Breakthroughs, Inc. (CBI)!

Headquartered just north of Detroit, our job since 1991 is ensuring your data and your business are secure, compliant and available. We are leaders, innovators and trusted advisors to many of the world’s top enterprises – large and small, crossing all sectors and industries. What sets us apart? Through our talent and technology we take a confident, Blue-Collar approach – guided by your vision – in optimizing your systems and processes. We ask the upfront questions that allow us to fully assess your IT risks and work with you to develop the clear roadmap and milestones ensuring successful engagements.


today and see how our team can create a complete, custom IT Risk Management solution for your organization.

LATEST

TWEETS

Who Watches the Watchers? Firewall Monitoring http://t.co/vdA58M7wAO #infosec #firewall #monitoring http://t.co/BE9oxWiY4U

So Many “Threat Trends” Reports Out There, But There’s Only One #ISTR http://t.co/psh4RTeiC5 by @daveglenn #infosec http://t.co/Qzt9Tt0QEV

RT @stephen__thomas: What is Social Engineering? | Norton Community http://t.co/5XnPlGzRR7 #partner

Factory reset in Android phones leaves sensitive user data behind http://t.co/KOdZVEibZd by @CIOonline #infosec http://t.co/ClGBcgMFH6

Did you skip a post? View our recent blog posts http://t.co/qXbGDzxfga #infosec #IT #Security http://t.co/y7STHzNJdx

So Many “Threat Trends” Reports Out There, But There’s Only One #ISTR http://t.co/BC90LDaLSP by @daveglenn #infosec http://t.co/fFczJEf0Fq

How Hackers Get Free Coffee with Your Money http://t.co/sncdaPhSgZ by @jwgoerlich #infosec http://t.co/7PkuWVeuDr

NetUSB vulnerability leaves millions of routers open to attack http://t.co/2XNc7gWrug #infosec #vulnerability http://t.co/WZtbVmoEJ7

Data Migration – It takes time, expertise, and sometimes a little help http://t.co/ns4MkRPMrg #infosec #datamigration http://t.co/ZGPyFSLtWi

The Cost and Risks of Poor Application Management http://t.co/ydUx10SdEU #infosec #IT #security http://t.co/cS3OkCRqzs

Who’s flying the plane? The latest reason to never ignore security holes http://t.co/OmnL7Gqc8x #infosec http://t.co/OmVr2MurTr

RT @symantec #Mobile Threat Alert: Android.Dengaru #clickfraud http://t.co/YnFmcl105z http://t.co/POLeC6ByVj

Why Is Big Data Is So Big In Health Care? http://t.co/JKFjYEw95G by @Forbes #infosec #healthcare http://t.co/248yEpKr1G

Who Watches the Watchers? Firewall Monitoring http://t.co/fAMePrzA4M #infosec #firewall #monitoring http://t.co/a1ctKGWEQe

Our Security Strategist, @jwgoerlich comments on Beacon Payments (sub needed) http://t.co/ZIzLxfnMgv #infosec http://t.co/LKd5pVUMWV

New Blog: How Hackers Get Free Coffee with Your Money http://t.co/6oJUwkPOq4 by @jwgoerlich #infosec #breach http://t.co/USm9ImmtEl

American Express Spinoff Goes To Cloud For IT http://t.co/gAkGnGG1fl by @Tomgroenfeldt #infosec http://t.co/gwcE6iaksN

Live Event

Live Event

CONverge - Detroit


Join team CBI at the Converge Information Security Conference in Detroit!





Learn More




Featured Position

Featured Position

Account Executive


Looking for a great place to work? Check out our featured posting!










21 May

Retail Info Systems News: Is Starbucks Under Siege from Hackers

“As retailers and emerging payment systems develop bank-like functionality (funds…

Read More
21 May

MainStreet.com: Has Your Phone Number Been Stolen? Another Apple Pay Fraud Hits the Nation

While Apply Pay may be the hottest new convenience to…

Read More
21 May

FierceRetail IT: Tokenization no POS panacea; retailers need balanced security strategy

Securing credit card information comes down to securing all points…

Read More
15 May

Payments Source: Beacon Payments – A Bright Idea with Dim (Near-Term) Chances

“There are a large number of Bluetooth sniffing and wardriving…

Read More
Who Watches the Watchers? Firewall Monitoring http://t.co/vdA58M7wAO #infosec #firewall #monitoring http://t.co/BE9oxWiY4U
So Many “Threat Trends” Reports Out There, But There’s Only One #ISTR http://t.co/psh4RTeiC5 by @daveglenn #infosec http://t.co/Qzt9Tt0QEV
RT @stephen__thomas: What is Social Engineering? | Norton Community http://t.co/5XnPlGzRR7 #partner
Factory reset in Android phones leaves sensitive user data behind http://t.co/KOdZVEibZd by @CIOonline #infosec http://t.co/ClGBcgMFH6
Did you skip a post? View our recent blog posts http://t.co/qXbGDzxfga #infosec #IT #Security http://t.co/y7STHzNJdx
So Many “Threat Trends” Reports Out There, But There’s Only One #ISTR http://t.co/BC90LDaLSP by @daveglenn #infosec http://t.co/fFczJEf0Fq
How Hackers Get Free Coffee with Your Money http://t.co/sncdaPhSgZ by @jwgoerlich #infosec http://t.co/7PkuWVeuDr
NetUSB vulnerability leaves millions of routers open to attack http://t.co/2XNc7gWrug #infosec #vulnerability http://t.co/WZtbVmoEJ7
Data Migration – It takes time, expertise, and sometimes a little help http://t.co/ns4MkRPMrg #infosec #datamigration http://t.co/ZGPyFSLtWi
The Cost and Risks of Poor Application Management http://t.co/ydUx10SdEU #infosec #IT #security http://t.co/cS3OkCRqzs
Who’s flying the plane? The latest reason to never ignore security holes http://t.co/OmnL7Gqc8x #infosec http://t.co/OmVr2MurTr
RT @symantec #Mobile Threat Alert: Android.Dengaru #clickfraud http://t.co/YnFmcl105z http://t.co/POLeC6ByVj
Why Is Big Data Is So Big In Health Care? http://t.co/JKFjYEw95G by @Forbes #infosec #healthcare http://t.co/248yEpKr1G
Who Watches the Watchers? Firewall Monitoring http://t.co/fAMePrzA4M #infosec #firewall #monitoring http://t.co/a1ctKGWEQe
Our Security Strategist, @jwgoerlich comments on Beacon Payments (sub needed) http://t.co/ZIzLxfnMgv #infosec http://t.co/LKd5pVUMWV
New Blog: How Hackers Get Free Coffee with Your Money http://t.co/6oJUwkPOq4 by @jwgoerlich #infosec #breach http://t.co/USm9ImmtEl
American Express Spinoff Goes To Cloud For IT http://t.co/gAkGnGG1fl by @Tomgroenfeldt #infosec http://t.co/gwcE6iaksN