Wipfli logo

Partners and associates

Tom Wojcinski Milwaukee (Headquarters)

10000 W Innovation Dr.
Milwaukee, WI 53226

Tel:

414.431.9300


Email: tom.wojcinski@wipfli.com

Tom Wojcinski

Partner

Tom Wojcinski is a partner in Wipfli’s cybersecurity and technology management practice. He specializes in helping organizations reduce and manage the risks to modern technology and information systems. In today’s business environment, customers, trading partners, regulators and employees expect continuously available and secure information systems. To help meet this expectation, Tom works with clients to increase the security, availability, and recoverability of their information assets.

Tom leads a variety of engagements designed to help improve organizations’ cybersecurity posture, including cybersecurity risk assessment, control program development and implementation, incident response planning and simulation, vulnerability and penetration testing, security audit, control verification, and managed security services.  He is a frequent author and speaker on cybersecurity and information technology (IT) risk management topics.

Certifications

  • Certified Information Systems Auditor
  • Certified in Risk and Information Systems Control

Professional memberships and activities

  • American Institute of Certified Public Accountants
    (AICPA)
  • Information Systems Audit and Controls Association (ISACA)
  • Cloud Security Alliance (CSA)
  • Health Information Trust Alliance (HITRUST)

Areas of Focus

  • Cybersecurity
  • IT risk management
  • Managed services

Education

Marquette University
  • Bachelor of science degree in business administration with majors in finance and information technology

Recent Insights

Articles

Business continuity planning: How to prepare for a cyberattack
Sep 30, 2024

MFA best practices: The key to a robust cybersecurity program
Sep 27, 2024

4 ways to enhance your ransomware defense
Sep 24, 2024

Enhancing security with cybersecurity testing best practices
Sep 20, 2024

Protecting against digital disruption in manufacturing
Sep 16, 2024

How cybercrime is impacting the insurance industry
Jun 18, 2024

5 signs you’ve outgrown your IT managed security services
May 13, 2024

How the right IT managed security services provider can help you optimize and grow
May 13, 2024

5 cybersecurity measures to focus on now
Nov 16, 2023

How Microsoft’s built-in generative AI, Microsoft Copilot, intends to change how people work
Nov 03, 2023

Cyber regulations reach insurance industry with NAIC insurance data security model law
Nov 03, 2023

New data security laws for insurers: How to comply with NAIC cybersecurity model law
Nov 02, 2023

Should you use a single cybersecurity vendor? Or several?
Jun 26, 2023

How much is your data worth on the dark web?
Jun 15, 2023

Shedding light on dangers of the dark web
Apr 25, 2023

How cybersecurity boosts business resilience
Mar 15, 2023

Privileged access management checklist
Feb 23, 2023

Protect your manufacturing operations from digital disruption
Jan 23, 2023

Your nonprofit’s cyber and IT assessment checklist
Apr 04, 2022

The four biggest CMMC 2.0 changes
Dec 06, 2021

Top cybersecurity and IT assessment tools for nonprofits
Oct 28, 2021

$1.8 million penalty issued to financial services firms, signaling increased enforcement of NYDFS cybersecurity regulations
Jul 28, 2021

What you need to know about CMMC — today
Feb 09, 2021

A guide to CMMC: Who it applies to, how it will impact you, what parts of your org it applies to
Feb 08, 2021

How to prepare for CMMC
Feb 05, 2021

New interim rule continues DoD push to increase the security and resilience of the Defense Industrial Base sector
Oct 22, 2020

Investing in cybersecurity pays dividends
May 11, 2020

Managing risk from vendor dependencies in a crisis
Apr 01, 2020

Fighting the wave of coronavirus phishing scams
Mar 17, 2020

5 steps to strong cybersecurity for remote employees
Mar 15, 2020

Public Wi-Fi hygiene for your employees
Mar 13, 2020

How cybercriminals are targeting construction companies — and how to prevent it
Dec 11, 2019

5 cybersecurity due diligence best practices
Sep 30, 2019

Iranian cyberattacks and BlueKeep: What financial institutions need to know
Jul 31, 2019

In The News

External News

Protecting Plastics Processors from Digital Disruption
Plastics Business | May 20, 2024