Home / Leadership Team / Thomas Brown, CISA, CIA, Security+, CAPM
Thomas Brown is a supervisor in GRF’s Risk & Advisory Services department. He interacts with clients to show them potential weaknesses in their cybersecurity posture and provides guidance on next steps. Mr. Brown is responsible for performing IT Audits, fraud and forensic investigations, co-sourced internal audits, policy and procedure benchmarks, and third-party risk assessments. Additionally, he presents key observations and findings to clients and senior executives.
He also conducts risk assessments to identify, analyze, and review information technology, fraud, and other security risks and vulnerabilities facing organizations both externally and internally. This includes collaborating with clients to efficiently complete assessments and help identify the best ways to implement changes. Additionally, Mr. Brown manages the cybersecurity awareness training and phishing simulation programs for GRF and multiple clients. He recently achieved Certified Information Systems Auditor (CISA) certification.
Before joining GRF, Thomas worked as a Project Manager for managing the configuration and implementation of EMR systems at Epic.
In response to growing IT and cybersecurity risks, auditors are placing greater scrutiny on IT risk and risk controls in…
Understanding and mitigating third party risk has become more important than ever, which makes now the perfect time for your…
Does your organization know all the third-party vendors who access and manage data on your behalf? In the event of…
Our 2025 Top Risks Report explores the top risk themes of the year and the potential implications for nonprofits and…
In response to growing IT and cybersecurity risks, auditors are placing greater scrutiny on IT risk and risk controls in…
Understanding and mitigating third party risk has become more important than ever, which makes now the perfect time for your…
Does your organization know all the third-party vendors who access and manage data on your behalf? In the event of…
Our 2025 Top Risks Report explores the top risk themes of the year and the potential implications for nonprofits and…
In response to growing IT and cybersecurity risks, auditors are placing greater scrutiny on IT risk and risk controls in…
Understanding and mitigating third party risk has become more important than ever, which makes now the perfect time for your…
Does your organization know all the third-party vendors who access and manage data on your behalf? In the event of…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Identifying and mitigating website risks Data breaches are costly, and the…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Organizations use their online presence to attract donors, members, and clients…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series The threat of cyberattacks is frightening, persistent, and can affect any…
GRF’s third annual Virtual Cyber Symposium is designed to provide a 360-degree overview of the latest strategies for improving cybersecurity…
GRF’s second annual Virtual Cyber Symposium is designed to provide a 360-degree overview of the latest strategies for improving cybersecurity…
Cybersecurity threats are always changing and hackers are busy finding ways to exploit your assets. Download a PDF copy of…
Join GRF as we discuss the process for establishing a secured incident reporting platform that includes online reporting, document upload,…
Developing and maintaining a third party risk management (TPRM) program can help to reduce the overall risk to your organization.…
Cybersecurity is always changing and evolving as threats grow. Here are ideas that you can start on today that will…
TLDR: End user cybersecurity training is essential for preventing malicious actors from gaining unauthorized access to your organization’s network. Creating…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Fraudulent domains look very similar to your organization’s domain name and…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Securing the privacy of your organization’s employee and customer data is…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Social media has allowed organizations to connect with customers around the…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Simply put, Identity and Access Management (IAM) is the discipline of…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Web applications are a top target for attackers. Hackers are constantly…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series It’s crucial for your organization to have an online presence to…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Identifying and mitigating website risks Data breaches are costly, and the…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Organizations use their online presence to attract donors, members, and clients…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series The threat of cyberattacks is frightening, persistent, and can affect any…
GRF’s third annual Virtual Cyber Symposium is designed to provide a 360-degree overview of the latest strategies for improving cybersecurity…
GRF’s second annual Virtual Cyber Symposium is designed to provide a 360-degree overview of the latest strategies for improving cybersecurity…
Cybersecurity threats are always changing and hackers are busy finding ways to exploit your assets. Download a PDF copy of…
Join GRF as we discuss the process for establishing a secured incident reporting platform that includes online reporting, document upload,…
Developing and maintaining a third party risk management (TPRM) program can help to reduce the overall risk to your organization.…
Cybersecurity is always changing and evolving as threats grow. Here are ideas that you can start on today that will…
TLDR: End user cybersecurity training is essential for preventing malicious actors from gaining unauthorized access to your organization’s network. Creating…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Fraudulent domains look very similar to your organization’s domain name and…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Securing the privacy of your organization’s employee and customer data is…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Social media has allowed organizations to connect with customers around the…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Simply put, Identity and Access Management (IAM) is the discipline of…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Web applications are a top target for attackers. Hackers are constantly…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series It’s crucial for your organization to have an online presence to…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Identifying and mitigating website risks Data breaches are costly, and the…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Organizations use their online presence to attract donors, members, and clients…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series The threat of cyberattacks is frightening, persistent, and can affect any…