Tom Wojcinski
Partner
Tom Wojcinski is a partner in Wipfli’s cybersecurity and technology management practice. He specializes in helping organizations reduce and manage the risks to modern technology and information systems. In today’s business environment, customers, trading partners, regulators and employees expect continuously available and secure information systems. To help meet this expectation, Tom works with clients to increase the security, availability, and recoverability of their information assets.
Tom leads a variety of engagements designed to help improve organizations’ cybersecurity posture, including cybersecurity risk assessment, control program development and implementation, incident response planning and simulation, vulnerability and penetration testing, security audit, control verification, and managed security services. He is a frequent author and speaker on cybersecurity and information technology (IT) risk management topics.
Certifications
- Certified Information Systems Auditor
- Certified in Risk and Information Systems Control
Professional memberships and activities
- American Institute of Certified Public Accountants
(AICPA) - Information Systems Audit and Controls Association (ISACA)
- Cloud Security Alliance (CSA)
- Health Information Trust Alliance (HITRUST)
Areas of Focus
- Cybersecurity
- IT risk management
- Managed services
Education
Marquette University- Bachelor of science degree in business administration with majors in finance and information technology
Recent Insights
Articles
Business continuity planning: How to prepare for a cyberattack
Sep 30, 2024
MFA best practices: The key to a robust cybersecurity program
Sep 27, 2024
4 ways to enhance your ransomware defense
Sep 24, 2024
Enhancing security with cybersecurity testing best practices
Sep 20, 2024
Protecting against digital disruption in manufacturing
Sep 16, 2024
How cybercrime is impacting the insurance industry
Jun 18, 2024
5 signs you’ve outgrown your IT managed security services
May 13, 2024
How the right IT managed security services provider can help you optimize and grow
May 13, 2024
5 cybersecurity measures to focus on now
Nov 16, 2023
How Microsoft’s built-in generative AI, Microsoft Copilot, intends to change how people work
Nov 03, 2023
Cyber regulations reach insurance industry with NAIC insurance data security model law
Nov 03, 2023
New data security laws for insurers: How to comply with NAIC cybersecurity model law
Nov 02, 2023
New data security laws for insurers: How to comply with NAIC cybersecurity model law
Oct 31, 2023
Should you use a single cybersecurity vendor? Or several?
Jun 26, 2023
How much is your data worth on the dark web?
Jun 15, 2023
Shedding light on dangers of the dark web
Apr 25, 2023
How cybersecurity boosts business resilience
Mar 15, 2023
Privileged access management checklist
Feb 23, 2023
Protect your manufacturing operations from digital disruption
Jan 23, 2023
Your nonprofit’s cyber and IT assessment checklist
Apr 04, 2022
The four biggest CMMC 2.0 changes
Dec 06, 2021
3 cybersecurity tips for financial services
Dec 05, 2021
Top cybersecurity and IT assessment tools for nonprofits
Oct 28, 2021
What you need to know about CMMC — today
Feb 09, 2021
A guide to CMMC: Who it applies to, how it will impact you, what parts of your org it applies to
Feb 08, 2021
How to prepare for CMMC
Feb 05, 2021
New interim rule continues DoD push to increase the security and resilience of the Defense Industrial Base sector
Oct 22, 2020
Investing in cybersecurity pays dividends
May 11, 2020
Managing risk from vendor dependencies in a crisis
Apr 01, 2020
Fighting the wave of coronavirus phishing scams
Mar 17, 2020
5 steps to strong cybersecurity for remote employees
Mar 15, 2020
Public Wi-Fi hygiene for your employees
Mar 13, 2020
How cybercriminals are targeting construction companies — and how to prevent it
Dec 11, 2019
5 cybersecurity due diligence best practices
Sep 30, 2019
Iranian cyberattacks and BlueKeep: What financial institutions need to know
Jul 31, 2019
Podcasts
Episode 49: Cybersecurity Tips for Manufacturers
Oct 23, 2024
Videos And Webcasts
Strengthening cybersecurity in tribal entities
Aug 13, 2024
Healthcare Connections: Unmasking cyberthreats in healthcare
Feb 20, 2024
NAIC cybersecurity model rule implementation
Nov 19, 2023
Implementing effective cybersecurity in K-12 education
Oct 10, 2023
Build resilience through an effective cybersecurity plan
Mar 10, 2023
Best practices for manufacturers to boost hybrid workforce productivity and keep your Microsoft environment secure
May 05, 2021
Diving into CMMC requirements — including recent updates
Nov 18, 2020
In The News
External News
Protecting Plastics Processors from Digital Disruption
Plastics Business | May 20, 2024
Banks can face costly fallout of breaches
Wisconsin Bankers Association | Dec 07, 2020