Steven J. Ursillo, Jr.

Cybersecurity

Partner, Cherry Bekaert LLP
Partner, Cherry Bekaert Advisory LLC

CPA Licenses

  • CA-103626
  • DE-CA0002357
  • RI-2884

Additional Credentials

  • Certified Internal Auditor (CIA)
  • Certified Global Management Accountant (CGMA)
  • Certified Fraud Examiner (CFE)
  • Certified Information Security Manager (CISM)
  • Certified Information Technology Professional (CITP)
  • Certified in Governance and Enterprise IT (CGEIT)
  • Certified in Risk and Information Systems Controls (CRISC)
  • Certified Ethical Hacker (CEH)
  • Certified Common Security Framework Practitioner (CCSFP)

Education

  • Bachelor of Science in Business Administration, Bryant University
  • Masters of Computer Information Science, Boston University

 

Professional Involvement

  • American Institute of Certified Public Accountants (AICPA)
  • System and Organization (SOC) Task Force, AICPA
  • National Council, Information Management and Technology Assurance Committee ("IMTA"), AICPA
  • Co-chair, IMTA Cyber Security Task Force, (AICPA)

 

CPA Licenses

  • CA-103626
  • DE-CA0002357
  • RI-2884

Additional Credentials

  • Certified Internal Auditor (CIA)
  • Certified Global Management Accountant (CGMA)
  • Certified Fraud Examiner (CFE)
  • Certified Information Security Manager (CISM)
  • Certified Information Technology Professional (CITP)
  • Certified in Governance and Enterprise IT (CGEIT)
  • Certified in Risk and Information Systems Controls (CRISC)
  • Certified Ethical Hacker (CEH)
  • Certified Common Security Framework Practitioner (CCSFP)

Education

  • Bachelor of Science in Business Administration, Bryant University
  • Masters of Computer Information Science, Boston University

 

Professional Involvement

  • American Institute of Certified Public Accountants (AICPA)
  • System and Organization (SOC) Task Force, AICPA
  • National Council, Information Management and Technology Assurance Committee ("IMTA"), AICPA
  • Co-chair, IMTA Cyber Security Task Force, (AICPA)

 

Related Insights

Digital red warning sign in front of binary code

Article

6/17/2025 12:38:36 PM

Learn how ransomware and cyber espionage differ and why tailored incident response planning is key to minimizing business and legal risks.

Woman sitting at a wooden table looking at a laptop

Article

3/11/2025 1:45:53 PM

Learn how business email compromise (BEC) scams work, their financial impact and key prevention strategies to protect your business from email fraud.

Two service members walking between banks of servers

Article

3/10/2025 4:09:34 PM

Learn about DoD CMMC requirements for defense contractors, including assessment levels, waiver processes and compliance strategies.