IT Risk Management

IT Risk Management

CBI manages IT security risk and helps ensure your data is secure, compliant, and available.


Learn more about what we do
Featured Blog Post

Featured Blog Post

IT Maturity: The First Ten Steps to a Secure Future


Read our featured post!


Read Blog Post
CBI Career Opportunities

CBI Career Opportunities

CBI is attracting talented individuals to our dynamic team. Our industry is evolving more rapidly than ever, and at CBI, we are passionate about staying out in front of new innovations and industry challenges. We’re looking for team members with this same drive.


Apply Now
CBI Support

CBI Support

CBI's team of consultants are here to help you with your IT Risk Management needs. From installation to hardware/software configuration, our team is here to support you.


Learn More

Welcome to CBI

Headquartered just north of Detroit, our job since 1991 is ensuring your data and your business are secure, compliant and available. We are leaders, innovators and trusted advisors to many of the world’s top enterprises – large and small, crossing all sectors and industries. What sets us apart? Through our talent and technology we take a confident, Blue-Collar approach – guided by your vision – in optimizing your systems and processes. We ask the upfront questions that allow us to fully assess your IT risks and work with you to develop the clear roadmap and milestones ensuring successful engagements.


today and see how our team can create a complete, custom IT Risk Management solution for your organization.

LATEST

TWEETS

Baby monitor vulnerabilities bring IoT security issues into sharp focus http://t.co/z96hTW0HDW #infosec http://t.co/O1chckfYCu

Blog post: IT Maturity: The First Ten Steps to a Secure Future http://t.co/LVIfqjuqZe #infosec http://t.co/WfGBsf577B

Want to attend Hacker Halted in Atlanta? We have your ticket here: http://t.co/6R0t0khVag #cyberpandemic #sponsor http://t.co/4sAcoo96Yu

Don't miss our upcoming webinar on 09/22 with @jwgoerlich Measuring IT Maturity http://t.co/jHY6iFdMXG #infosec http://t.co/xIKX13IbXB

Four Out of Five US Healthcare Firms Have Been Hit by Cyber-Attacks http://t.co/YI96U0Cdq9 #infosec #healthcare http://t.co/1Edbp5RFgl

Sick of memorizing passwords? A Turing Award winner came up w/ this algorithmic trick http://t.co/uWyYKM8zAl #infosec http://t.co/F9gFavpZo7

Join us in Atlanta @HackerHalted on 09/17-18. http://t.co/s7gEkuffVI #cyberpandemic #infosec http://t.co/20RAXEpIQD

New blog post by @jwgoerlich: IT Maturity: The First Ten Steps to a Secure Future http://t.co/3ETBHvR9Dy #infosec http://t.co/qOJtqZHTpN

Here's How Iranian Hackers Can Hack Your Gmail Accounts http://t.co/gHt9g6msPq by @Swati_THN #infosec http://t.co/k5s8fmgl2i

A New Product Differentiator? http://t.co/LCL0DJcbPV by @PatrickBoyd01 http://t.co/rMu3rDFh0j

Do CIOs and CISOs Get Covered in Cybersecurity Litigation? http://t.co/jvUDWnX2pU by @CatalystSecure #infosec http://t.co/1Yb5xh9rog

No plans tonight? Stop by @issa_motorcity event in Livonia http://t.co/korZT4HP0j #misec #infosec http://t.co/eLmrC7BgLn

Still time to register for our webinar today with @IBMSecurity: Closing Endpoint Security Gaps http://t.co/qEJ7nZMzo3 #infosec #partner

Looking for new career opportunity? Join us @issa_motorcity event tomorrow. http://t.co/57oRaIj4wu #misec http://t.co/VVrOLWXNnj

Hackers, Cars, and Application Development http://t.co/ZZCW5RmPCQ by @jbeeskow #infosec http://t.co/BwUl3BGoUj

Live Event

Live Event

Hacker Halted


Join Team CBI at Hacker Halted 2015 in Atlanta, a global series of Computer and Information Security conferences presented by EC-Council.





Learn More




Featured Position

Featured Position

Account Executive


Looking for a great place to work? Check out our featured posting!










11 August

ComputerWorld: Target gets smart about beacons

“Although there are many pros and cons to Target’s initial…

Read More
10 July

Vision and Business Growth Lead CBI To Open Its New Detroit Location

FERNDALE, Mich., July 10, 2015 – CBI, a leading IT…

Read More
03 June

CBI Strengthens Strategic Alliance Team; Appoints New EVP

CBI, a leader in IT risk management, announced today that…

Read More
21 May

Retail Info Systems News: Is Starbucks Under Siege from Hackers

“As retailers and emerging payment systems develop bank-like functionality (funds…

Read More
Baby monitor vulnerabilities bring IoT security issues into sharp focus http://t.co/z96hTW0HDW #infosec http://t.co/O1chckfYCu
Blog post: IT Maturity: The First Ten Steps to a Secure Future http://t.co/LVIfqjuqZe #infosec http://t.co/WfGBsf577B
Want to attend Hacker Halted in Atlanta? We have your ticket here: http://t.co/6R0t0khVag #cyberpandemic #sponsor http://t.co/4sAcoo96Yu
Don't miss our upcoming webinar on 09/22 with @jwgoerlich Measuring IT Maturity http://t.co/jHY6iFdMXG #infosec http://t.co/xIKX13IbXB
Four Out of Five US Healthcare Firms Have Been Hit by Cyber-Attacks http://t.co/YI96U0Cdq9 #infosec #healthcare http://t.co/1Edbp5RFgl
Sick of memorizing passwords? A Turing Award winner came up w/ this algorithmic trick http://t.co/uWyYKM8zAl #infosec http://t.co/F9gFavpZo7
Join us in Atlanta @HackerHalted on 09/17-18. http://t.co/s7gEkuffVI #cyberpandemic #infosec http://t.co/20RAXEpIQD
New blog post by @jwgoerlich: IT Maturity: The First Ten Steps to a Secure Future http://t.co/3ETBHvR9Dy #infosec http://t.co/qOJtqZHTpN
Here's How Iranian Hackers Can Hack Your Gmail Accounts http://t.co/gHt9g6msPq by @Swati_THN #infosec http://t.co/k5s8fmgl2i
A New Product Differentiator? http://t.co/LCL0DJcbPV by @PatrickBoyd01 http://t.co/rMu3rDFh0j
Do CIOs and CISOs Get Covered in Cybersecurity Litigation? http://t.co/jvUDWnX2pU by @CatalystSecure #infosec http://t.co/1Yb5xh9rog
No plans tonight? Stop by @issa_motorcity event in Livonia http://t.co/korZT4HP0j #misec #infosec http://t.co/eLmrC7BgLn
Still time to register for our webinar today with @IBMSecurity: Closing Endpoint Security Gaps http://t.co/qEJ7nZMzo3 #infosec #partner
Looking for new career opportunity? Join us @issa_motorcity event tomorrow. http://t.co/57oRaIj4wu #misec http://t.co/VVrOLWXNnj
Hackers, Cars, and Application Development http://t.co/ZZCW5RmPCQ by @jbeeskow #infosec http://t.co/BwUl3BGoUj