{"id":1940,"date":"2026-04-19T20:37:38","date_gmt":"2026-04-19T20:37:38","guid":{"rendered":"https:\/\/iqeq.com\/us\/?post_type=service&#038;p=1940"},"modified":"2026-04-19T20:37:39","modified_gmt":"2026-04-19T20:37:39","slug":"cybersecurity-services","status":"publish","type":"service","link":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/","title":{"rendered":"Cybersecurity services"},"content":{"rendered":"<section class=\"sidebar-anchor\">\n    <div class=\"container\">\n                    <p\n                class=\"pre-header pre-header--deepgray\"\n                id=\"overview\"\n            >\n                Overview            <\/p>\n            <\/div>\n<\/section>\n\n<section class=\"text-block standard-spacing  \">    <div class=\"container fade-in\">\n        <p>IQ-EQ U.S. provides comprehensive, end-to-end cybersecurity services designed to ensure compliance with regulatory requirements, privacy laws and industry best practices. Our multi-faceted offering utilizes a combination of centralized automation and advisory expertise to build effective cybersecurity programs with highly efficient and reliable execution.<\/p>\n            <\/div>\n<\/section>\n\n<section class=\"sidebar-anchor\">\n    <div class=\"container\">\n                    <h2 id=\"our-core-cybersecurity-services\">Our core cybersecurity services<\/h2>\n            <\/div>\n<\/section>\n\n<section class=\"text-block standard-spacing  \">    <div class=\"container fade-in\">\n        <h3>Identification and buildout<\/h3>\n<ul class=\"ticks\">\n<li><strong>Risk assessment<\/strong> \u2013 We evaluate the security of your cyber environment, identify weaknesses and gaps against regulatory obligations, and recommend improvements<\/li>\n<li><strong>Written information security policy<\/strong> \u2013 We develop and maintain cybersecurity policies and procedures tailored to your firm\u2019s business operations, taking into account risk profile, regulatory requirements and industry standards<\/li>\n<li><strong>Incident response planning<\/strong> \u2013 We develop and maintain incident response plans, including breach event reporting and remedial advisory services<\/li>\n<li><strong>Vendor risk due diligence and monitoring<\/strong> \u2013 We provide basic due diligence and ongoing cyber risk monitoring of third-party vendors with data access (unlimited coverage)<\/li>\n<li><strong>Cybersecurity awareness training<\/strong> \u2013 We deliver interactive training, security alerts and continuing education designed for investment professionals<\/li>\n<li><strong>Cyber insurance assessment<\/strong> \u2013 We identify and assess risk of loss, with customized policies available upon request<\/li>\n<\/ul>\n<h3>Monitoring and detection<\/h3>\n<ul class=\"ticks\">\n<li><strong>Device endpoint monitoring<\/strong> \u2013 We perform real-time scanning and compliance monitoring for all endpoints and connected networks, issuing ongoing alerts for policy and network failures. We use a centralized cybersecurity platform for consolidated compliance reporting and program management<\/li>\n<li><strong>Network vulnerability scanning and penetration testing<\/strong> \u2013 We conduct vulnerability scanning and external penetration testing to simulate real-world attacks, uncover exploitable vulnerabilities, and validate security controls<\/li>\n<li><strong>Phishing simulation<\/strong> \u2013 We distribute phishing attempts randomly to promote proper user behavior<\/li>\n<li><strong> Dark web monitoring<\/strong> \u2013 We perform ongoing scanning of the dark web for breaches and company domain activity<\/li>\n<\/ul>\n<h3>Response, recovery and review<\/h3>\n<ul class=\"ticks\">\n<li><strong>Incident response testing<\/strong> \u2013 We generate and test policy documents to enhance organizational resilience<\/li>\n<li><strong>Annual program review<\/strong> \u2013 We conduct an annual review of your cybersecurity program and prepare enhancements as necessary<\/li>\n<\/ul>\n            <\/div>\n<\/section>\n\n<section class=\"sidebar-anchor\">\n    <div class=\"container\">\n                    <h2 id=\"optional-value-added-cybersecurity-services\">Optional value-added cybersecurity services<\/h2>\n            <\/div>\n<\/section>\n\n<section class=\"text-block standard-spacing  \">    <div class=\"container fade-in\">\n        <ul>\n<li>Support for operational due diligence requests and investor questionnaires<\/li>\n<li>Customized, in-depth vendor due diligence and monitoring<\/li>\n<li>Specialized technology due diligence, including bespoke assessments of artificial intelligence engines and other emerging tools<\/li>\n<li>Drafting of customized, detailed reports and memoranda<\/li>\n<li>Internal penetration testing to identify network vulnerabilities from within<\/li>\n<li>Cloud cybersecurity assessments and consulting services<\/li>\n<li>Microsoft 365 security reviews and related evaluations<\/li>\n<li>Cybersecurity focused mock regulatory examinations<\/li>\n<li>Bespoke cybersecurity training sessions<\/li>\n<li>Advisory services related to privacy law compliance, including Regulation S-P<\/li>\n<li>Business continuity plan tabletop exercise<\/li>\n<\/ul>\n            <\/div>\n<\/section>\n\n<section class=\"hubspot-form standard-spacing\">\n    <div class=\"container fade-in\">\n        <div class=\"wp-block-hubspot\">\n                            <h2 class=\"wp-block-hubspot__title\">Get in touch<\/h2>\n                                        <div class=\"wp-block-hubspot__form\">\n                    \n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 1931131,\n\t\t\t\t\t\t\t\t\tformId: \"6fba30e7-6fb2-4499-a083-5b3e4b18ac52\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1776703858000-6774969810\",\n\t\t\t\t\t\t\t\t\tregion: \"\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1776703858000-6774969810\"><\/div>                <\/div>\n                    <\/div>\n    <\/div>\n<\/section>\n\n\n<section class=\"sidebar-anchor\">\n    <div class=\"container\">\n                    <h2 id=\"key-contacts\">Key contacts<\/h2>\n            <\/div>\n<\/section>\n\n    <section class=\"related-section related-section--people related-section--centered standard-spacing\">\n        <div class=\"container\">\n                        <div class=\"cards row-load\">\n                    <div class=\"person-card\">\n                    <a href=\"https:\/\/iqeq.com\/us\/people\/sean-wilke\/\" class=\"bg-img lozad normal\">\n                <img width=\"290\" height=\"192\" class=\"attachment-person_card size-person_card lozad\" alt=\"\" data-src=\"https:\/\/iqeq.com\/us\/wp-content\/uploads\/sites\/3\/2024\/08\/Sean-Wilke-Formal-Grey_0-290x192.png\" \/>            <\/a>\n            <a href=\"https:\/\/iqeq.com\/us\/people\/sean-wilke\/\" class=\"bg-img lozad hover\">\n                <img width=\"290\" height=\"192\" class=\"attachment-person_card size-person_card lozad\" alt=\"\" data-src=\"https:\/\/iqeq.com\/us\/wp-content\/uploads\/sites\/3\/2024\/08\/Sean-Wilke-Informal-Green-290x192.png\" \/>            <\/a>\n                <div class=\"info\">\n                            <h3>\n                    <a href=\"https:\/\/iqeq.com\/us\/people\/sean-wilke\/\">Sean Wilke<\/a>\n                <\/h3>\n                        <p class=\"job-title\">Head of Growth Strategy, Americas<\/p>\n            <div class=\"border\"><\/div>\n                            <p class=\"location\">United States<\/p>\n                        <a href=\"#contact-person\" class=\"link link--deepgray email\">\n                Send email            <\/a>\n                            <a href=\"tel:+16464534298\" class=\"link telephone\">\n                    +1 646 453 4298                <\/a>\n                                        <a href=\"https:\/\/iqeq.com\/us\/people\/sean-wilke\/\" class=\"link link--deepgray permalink\">\n                    Full profile                <\/a>\n                                        <div class=\"socials\">\n                    <a href=\"https:\/\/www.linkedin.com\/in\/seanrwilke\/\" class=\"linkedin\">\n                        <span class=\"screen-reader-text\">LinkedIn<\/span>\n                    <\/a>\n                <\/div>\n                    <\/div>\n    <\/div>\n            <\/div>\n            <div class=\"button-wrapper\">\n                            <\/div>\n        <\/div>\n    <\/section>\n\n\n<section class=\"sidebar-anchor\">\n    <div class=\"container\">\n                    <h2 id=\"related-insights\">Related Insights<\/h2>\n            <\/div>\n<\/section>\n\n<section class=\"related-section related-section--insights standard-spacing\">\n    <div class=\"container\">\n                <div class=\"cards row-load\">\n            <a\n    href=\"https:\/\/iqeq.com\/us\/insights\/cybersecurity-enforcement-trends-what-investment-advisers-need-to-know\/\"\n    class=\"news-card\"\n>\n    <div class=\"bg-img lozad\">\n        <img width=\"360\" height=\"257\" class=\"attachment-news_card size-news_card lozad\" alt=\"\" data-src=\"https:\/\/iqeq.com\/us\/wp-content\/uploads\/sites\/3\/2026\/02\/AdobeStock_1874039017-360x257.jpeg\" \/>        <div class=\"post-type post\">\n            Insight        <\/div>\n    <\/div>\n    <div class=\"info\">\n                <div class=\"top\">\n                            <p class=\"expertise-label\">Regulatory Compliance<\/p>\n                        <h3>Cybersecurity enforcement trends: what investment advisers need to know<\/h3>\n                    <\/div>\n        <div class=\"bottom\">\n                            <p class=\"person\">By Sean Wilke<\/p>\n                        <p class=\"date\">\n                                    11 Feb 2026                                            <\/p>\n        <\/div>\n    <\/div>\n<\/a>        <\/div>\n            <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","expertise":[],"service_category":[33],"class_list":["post-1940","service","type-service","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity services | IQ-EQ U.S.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity services | IQ-EQ U.S.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/\" \/>\n<meta property=\"og:site_name\" content=\"IQ-EQ U.S.\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-19T20:37:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/\",\"url\":\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/\",\"name\":\"Cybersecurity services | IQ-EQ U.S.\",\"isPartOf\":{\"@id\":\"https:\/\/iqeq.com\/us\/#website\"},\"datePublished\":\"2026-04-19T20:37:38+00:00\",\"dateModified\":\"2026-04-19T20:37:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/iqeq.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/iqeq.com\/us\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iqeq.com\/us\/#website\",\"url\":\"https:\/\/iqeq.com\/us\/\",\"name\":\"IQ-EQ U.S.\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iqeq.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity services | IQ-EQ U.S.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity services | IQ-EQ U.S.","og_url":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/","og_site_name":"IQ-EQ U.S.","article_modified_time":"2026-04-19T20:37:39+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/","url":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/","name":"Cybersecurity services | IQ-EQ U.S.","isPartOf":{"@id":"https:\/\/iqeq.com\/us\/#website"},"datePublished":"2026-04-19T20:37:38+00:00","dateModified":"2026-04-19T20:37:39+00:00","breadcrumb":{"@id":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/iqeq.com\/us\/services\/cybersecurity-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iqeq.com\/us\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/iqeq.com\/us\/services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity services"}]},{"@type":"WebSite","@id":"https:\/\/iqeq.com\/us\/#website","url":"https:\/\/iqeq.com\/us\/","name":"IQ-EQ U.S.","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iqeq.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/service\/1940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/types\/service"}],"wp:attachment":[{"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/media?parent=1940"}],"wp:term":[{"taxonomy":"expertise","embeddable":true,"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/expertise?post=1940"},{"taxonomy":"service_category","embeddable":true,"href":"https:\/\/iqeq.com\/us\/wp-json\/wp\/v2\/service_category?post=1940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}