Main Menu

Case Studies

What We Do

  • Advanced Penetration Testing
  • Digital Forensics
  • Incident Response
  • Industry Regulatory Compliance
  • Internal Audit
  • Security Operations Center
  • SSAE 16/SOC Reporting
  • Strategic IT Advisory
Advanced Penetration Testing

Advanced penetration tests emulate the activities of advanced persistent threat actors (such as nation-state threats or organized crime) who would carry out a cyber attack against your organization. 

Learn More

Digital Forensics

HORNE Cyber provides expert witness testimony in court cases in the area of digital forensics and utilizes years of experience to identify and recover data that is no longer accessible using the native operating system.

Learn More >

Incident Response

While the traditional view of cybersecurity was to simply focus on keeping hackers out, today’s organizations must plan for the worst with a proactive approach to protect their IT environment and minimize data loss.

Learn More >

Industry Regulatory Compliance

Technology change creates new risks, regulations and opportunities. Our team helps your organization stay compliant across a range of regulatory-mandated assessments and audits.

Learn More >

Internal Audit

HORNE Cyber understands the risks you face. We bring insight and solutions to mitigate risks and turn them to opportunities for your organization to grow and innovate.

Learn More >

Security Operations Center

HORNE Cyber’s Security Operations Center (SOC) service supplements your existing security efforts by partnering with your IT staff to provide situational awareness through security monitoring and threat intelligence.

Learn More >

SSAE 16/SOC Reporting

The HORNE Cyber team provides SOC reports in a wide range of industries. HORNE Cyber leverages cybersecurity expertise and CPA discipline to provide a unique approach to helping organizations complete SOC 1 (Type 1 and 2), SOC 2 (Type 1 and 2), and SOC 3 examinations.

Learn More >

Strategic IT Advisory

Our team helps clients every step of the way – from establishing a sound IT environment with proven policies and procedures, to providing advice on managing third party vendors and helping your organization recover from a negative event while keeping the company operating smoothly.

Learn More >

Hidden Cyber Risk

Our anticipatory approach finds organization-specific cyber risks that are “below the surface” by manually emulating the persistent aggressive actions of a true attacker.

UNCOVER YOUR RISK