CBI Announcements

Stay in the know with CBI news and IT Risk Management  

CBI Hires SVP of Professional Services

Detroit – CBI, a Michigan-based provider of IT risk management services and solutions, has hired Jim Shaw as SVP of professional services, where he will lead the team from the organization’s new Detroit office. CBI CEO and President Steve Barone made the announcement. Shaw possesses more than 10 years of experience in enterprise technology consulting. […]

CBI Hires Atlanta Information Security Strategist

Atlanta, GA, November 24, 2015 – CBI, a Michigan-based provider of IT risk management services and solutions, has hired Michael Pearson as its new security strategist in Atlanta, representing the company as a subject matter expert on client engagements and at industry events, and leading the CBI Academy. CBI CEO and President Steve Barone made […]

New Sign Up at CBI Detroit Office

CBI’s new downtown Detroit office is coming together! The latest milestone was the recent building sign installation, watch this fun time-lapse video. CBI Sign 2015 from CBI on Vimeo.

Vision and Business Growth Lead CBI To Open Its New Detroit Location

FERNDALE, Mich., July 10, 2015 – CBI, a leading IT risk management organization, announced the company’s decision to open a new, downtown Detroit location in early September 2015. The announcement was made by Steve Barone, CEO of CBI, and native Detroiter, as part of CBI’s continued growth and expansion. The company will have naming rights […]

CBI Strengthens Strategic Alliance Team; Appoints New EVP

CBI, a leader in IT risk management, announced today that seasoned IT leader Chuck Hegarty has been named executive vice president of strategic alliances, a newly formed role at CBI as part of its expanding strategic alliances program. As the EVP of strategic alliances, Hegarty will focus on growing CBI’s partner programs. His responsibilities will […]
Posted on
Malware found pre-installed on some Android devices https://t.co/uXZlORJiWk https://t.co/rNITSLIVX5
Companies have increasing confidence in the cloud and its security capabilities #InfoSec #CloudSecurityhttps://t.co/hg14AWsIDb
Malware, adware, hidden apps & other risks make more than 20 million mobile devices susceptible for attacks… https://t.co/kEmikW1i3t
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/421bePLUf7 https://t.co/yB59wTELZo
Why small-business owners are easy prey for hackers #InfoSec https://t.co/70i2Zl7MDi https://t.co/1RgbSdRL1X
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/zsUACHzdLq
When #Ransomware hits, should a company pay up? https://t.co/XrsBj5G12H https://t.co/DaXCsNoSnA
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/BTM4lHy6i1 https://t.co/yUIHUsidDp
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/GDzYmDjdhc
Why small-business owners are easy prey for hackers #InfoSec https://t.co/HgxAcbSk0Q https://t.co/Jxtstjkcqp
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/J9JN4XGgGZ
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/ClUE788hbx
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/25KYcHYwy6
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/SdFVuLD849
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/uZjPFeF3hC
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/GGXfafItLR
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/jRBAP3dM5I
#ShadowIT continues to haunt the threat landscape in Cloud security #InfoSec https://t.co/v0VPU98G9L https://t.co/l74YUhZLgY
What are the top three threats CISOs can't yet handle? https://t.co/nPsqH4fqzc https://t.co/atM6whVMeu
Rogue apps plague IT teams. Knowing how many applications are really on your network is crucial #InfoSechttps://t.co/aNFRXz9bHu