IT Risk Management

IT Risk Management

CBI manages IT security risk and helps ensure your data is secure, compliant, and available.


Learn more about what we do
Featured Blog Post

Featured Blog Post

Who Watches the Watchers? Firewall Monitoring


Read our featured post by our Security Strategist, J.Wolfgang Goerlich!


Read Blog Post
CBI Career Opportunities

CBI Career Opportunities

CBI is attracting talented individuals to our dynamic team. Our industry is evolving more rapidly than ever, and at CBI, we are passionate about staying out in front of new innovations and industry challenges. We’re looking for team members with this same drive.


Apply Now
CBI Support

CBI Support

CBI's team of consultants are here to help you with your IT Risk Management needs. From installation to hardware/software configuration, our team is here to support you.


Learn More
 CBI Expands Forensics and Dispute Resolution Group

CBI Expands Forensics and Dispute Resolution Group

Selected By “Big 4” Consulting Firm as a Fraud and Cyber Crime Assessment and Control Contractor


Read the press release

Welcome to Creative Breakthroughs, Inc. (CBI)!

Headquartered just north of Detroit, our job since 1991 is ensuring your data and your business are secure, compliant and available. We are leaders, innovators and trusted advisors to many of the world’s top enterprises – large and small, crossing all sectors and industries. What sets us apart? Through our talent and technology we take a confident, Blue-Collar approach – guided by your vision – in optimizing your systems and processes. We ask the upfront questions that allow us to fully assess your IT risks and work with you to develop the clear roadmap and milestones ensuring successful engagements.


today and see how our team can create a complete, custom IT Risk Management solution for your organization.

LATEST

TWEETS

Join @jwgoerlich at the Ann Arbor .NET Developers' Group event on May 13th at Forge! http://t.co/T3GbeIxRQ2 #AAND http://t.co/XW25TXCiKQ

IoT considerations for CIOs http://t.co/uBDKWwYF9Z by @CIOonline #infosec http://t.co/hOqFTkwHuk

Data Migration – It takes time, expertise, and sometimes a little help http://t.co/rXb9iLbw49 #infosec #datamigration http://t.co/agKiRU2Ix2

Use your existing #security tech to hunt for cyber criminals and breaches: http://t.co/MpALJyCNAP #HP #infosec #partner via @hpsecurity

Catch up on our recent blog posts by @daveglenn & @jwgoerlich http://t.co/RVDmuBQxeS #infosec #breaches #firewall http://t.co/qMoRsEHjfx

RT @jwgoerlich "But we trust our employees." As JP Morgan finds out,the insider threat is real http://t.co/5ChnNNAZgu http://t.co/3VVo249Q4y

In case you missed it, our EVP @jbeeskow chatted with @symantec at #RSAC http://t.co/OFW6LNpUXv http://t.co/rxWxGbrXZW

AT&T Data Breach - Part 2: A $25M Lesson in Compliance http://t.co/KVngjmQrU7 by @daveglenn #infosec #breach http://t.co/ws3d4Xiawy

RT @hpsecurity #Mobile app threats? Not with #HP #Fortify. Learn how we're fending off these threats: http://t.co/F9xkZIVgI4 #infosec

Who Watches the Watchers? Firewall Monitoring http://t.co/0Xei4VGpVf #infosec #firewall #monitoring http://t.co/pcjvpjVT30

The Cost and Risks of Poor Application Management http://t.co/YaXOothk6E #infosec #IT #security http://t.co/Gjz6QKOsfN

RT @crainsdetroit Cybersecurity in cars: Are we at risk? http://t.co/V13KuMzN59 #infosec http://t.co/9thj6Frhdt

Data Migration – It takes time, expertise, and sometimes a little help http://t.co/hJwV0cCgHq #infosec #datamigration http://t.co/lJnzvbtH8B

Our CEO comments on our partner @FireMon recent hires http://t.co/jzThx76kwy #partner #infosec http://t.co/WPnvevldCx

New blog post! Who Watches the Watchers? #Firewall Monitoring http://t.co/iXxwokqNcr by @jwgoerlich #infosec http://t.co/LTfupRN2z7

Data Migration – It takes time, expertise & sometimes a little help http://t.co/7JdWmRHkGP #infosec #data #migration http://t.co/g15PNUcelD

Why Choose A Purpose-Built Backup Appliance? http://t.co/XIL42Qgpnx by @john_meaders #infosec #nbu http://t.co/VWagLFoder

Webinar On-Demand

Webinar On-Demand

IT Security: It’s Time to Confront the Complex Threat Landscape


Watch it now!





View Webinar




Featured Position

Featured Position

Enterprise Security Architect / Security Strategist


Looking for a great place to work? Check out our featured posting!










15 April

E-Commerce Times: The Futility of the Strong Password Solution

“A lot of the risk threat is going to depend…

Read More
15 April

CSO Online: Tokenization would not have prevented most retail breaches

“The tokenization takes effect after the credit card has been…

Read More
03 February

CRN: Partners – HP Security Unit Channel Changes Are Opening Door To Big Sales Gains

“It’s a big breakthrough,” said Barone. “You now have 4,500…

Read More
20 November

CBI Named As A "Cool Place to Work" in Michigan For Second Time

CBI, a leading IT risk management company based in Troy,…

Read More
Join @jwgoerlich at the Ann Arbor .NET Developers' Group event on May 13th at Forge! http://t.co/T3GbeIxRQ2 #AAND http://t.co/XW25TXCiKQ
IoT considerations for CIOs http://t.co/uBDKWwYF9Z by @CIOonline #infosec http://t.co/hOqFTkwHuk
Data Migration – It takes time, expertise, and sometimes a little help http://t.co/rXb9iLbw49 #infosec #datamigration http://t.co/agKiRU2Ix2
Use your existing #security tech to hunt for cyber criminals and breaches: http://t.co/MpALJyCNAP #HP #infosec #partner via @hpsecurity
Catch up on our recent blog posts by @daveglenn & @jwgoerlich http://t.co/RVDmuBQxeS #infosec #breaches #firewall http://t.co/qMoRsEHjfx
RT @jwgoerlich "But we trust our employees." As JP Morgan finds out,the insider threat is real http://t.co/5ChnNNAZgu http://t.co/3VVo249Q4y
In case you missed it, our EVP @jbeeskow chatted with @symantec at #RSAC http://t.co/OFW6LNpUXv http://t.co/rxWxGbrXZW
AT&T Data Breach - Part 2: A $25M Lesson in Compliance http://t.co/KVngjmQrU7 by @daveglenn #infosec #breach http://t.co/ws3d4Xiawy
RT @hpsecurity #Mobile app threats? Not with #HP #Fortify. Learn how we're fending off these threats: http://t.co/F9xkZIVgI4 #infosec
Who Watches the Watchers? Firewall Monitoring http://t.co/0Xei4VGpVf #infosec #firewall #monitoring http://t.co/pcjvpjVT30
The Cost and Risks of Poor Application Management http://t.co/YaXOothk6E #infosec #IT #security http://t.co/Gjz6QKOsfN
RT @crainsdetroit Cybersecurity in cars: Are we at risk? http://t.co/V13KuMzN59 #infosec http://t.co/9thj6Frhdt
Data Migration – It takes time, expertise, and sometimes a little help http://t.co/hJwV0cCgHq #infosec #datamigration http://t.co/lJnzvbtH8B
Our CEO comments on our partner @FireMon recent hires http://t.co/jzThx76kwy #partner #infosec http://t.co/WPnvevldCx
New blog post! Who Watches the Watchers? #Firewall Monitoring http://t.co/iXxwokqNcr by @jwgoerlich #infosec http://t.co/LTfupRN2z7
Data Migration – It takes time, expertise & sometimes a little help http://t.co/7JdWmRHkGP #infosec #data #migration http://t.co/g15PNUcelD
Why Choose A Purpose-Built Backup Appliance? http://t.co/XIL42Qgpnx by @john_meaders #infosec #nbu http://t.co/VWagLFoder