LBMC

LBMC

Speciality: External Penetration Testing

Brentwood, United States 748 employees
[01] About

LBMC is a private accounting and professional services firm based in Brentwood, Tennessee, with 498 employees and $192.7M in annual revenue. Founded in 1984, it offers consulting, accounting, tax, audit, advisory, HR, staffing, security, and technology services. The firm is the largest professional services provider in Tennessee and ranks among the top 50 accounting firms nationally. It also provides penetration testing services, including external, internal, wireless, web application, and social engineering tests, as detailed on their official website.

Initially founded as a traditional accounting firm in 1984, LBMC has become the largest professional services solutions provider based in Tennessee. As a top 50 accounting firm in the country, we’ve become industry leaders in accounting and finance, human resources, technology, risk and information security, and wealth advisory services for both businesses and individuals. Through all the growth and change, one defining trait has always remained the same: the genuine southern hospitality we bring to every client. Truthfully, we can’t imagine doing business any other way. Our belief in delivering dedicated personal attention to every client allows us to maintain the responsiveness of a regional firm, while offering the expertise of a national provider. For us, a high standard of service isn’t just a priority — it’s a non-negotiable. And this commitment has served us well. LBMC, a Forbes 2022 Top Recommended Firm, has been named a Fortune Certified Great Place to Work as measured by employee feedback in the Trust Index™ Survey. The certification is a result of the Great Place to Work U.S. National Employee Engagement Study in which more than 90% of LBMC team members rated the firm as a Great Place to Work. LBMC has won many awards this year including the 2021 Pacesetter in Growth by Accounting Today and we are on pace to a comparable growth rate this year. We are looking for top talent to fill these new roles on our ever-growing team! And if you are looking for a new opportunity to grow working alongside with an award winning team and clients that you love, contact one of our recruiters.
[02] Services
Tax
Audit
Human Resources
Security
Technology Services
Advisory Services
Business Intelligence
Valuation
Healthcare Consulting
Cybersecurity
Forensic Accounting
Transaction Advisory
Penetration Testing
[03] Certifications
PCI DSS

PCI DSS Certification


Origin


The Payment Card Industry Data Security Standard (PCI DSS) was created in 2004 by the major credit card companies: Visa, Mastercard, American Express, Discover, and JCB International. These companies formed the PCI Security Standards Council in 2006 to manage and evolve the standard. PCI DSS was developed in response to increasing credit card fraud and data breaches, establishing a unified set of security requirements for all organizations that store, process, or transmit cardholder data. The goal was to create consistent security measures across the payment card industry to protect sensitive payment information.


Industry Value and Importance


PCI DSS compliance is mandatory for any business that handles credit card transactions, making it one of the most critical security standards in commerce today. The certification demonstrates that an organization has implemented robust security controls, including network protection, access management, encryption, and regular security testing. Non-compliance can result in severe consequences, including substantial fines (up to $100,000 per month), increased transaction fees, loss of payment processing privileges, and reputational damage following a breach. For IT professionals, PCI DSS expertise is highly valued as organizations across all industries need qualified personnel to implement, maintain, and audit these security controls.

ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

SOC 1

SOC 1 Certification


Origin


SOC 1 (Service Organization Control 1) was developed by the American Institute of Certified Public Accountants (AICPA) in 2011 as a replacement for the SAS 70 audit standard. The AICPA created SOC 1 to provide a more comprehensive and standardized framework for assessing controls at service organizations that could impact their clients' financial reporting. This certification was specifically designed to address the growing need for third-party assurance as businesses increasingly outsourced critical functions like payroll processing, claims administration, and other services that directly affect financial statements.


Industry Value


SOC 1 reports are highly valued because they provide independent verification that a service organization has implemented effective controls over financial reporting processes. For companies that rely on external service providers, a SOC 1 report offers crucial assurance that their vendors maintain adequate safeguards, helping them meet their own audit and regulatory compliance requirements under standards like Sarbanes-Oxley. This certification has become an industry standard for demonstrating trustworthiness and transparency, often serving as a prerequisite for winning contracts with enterprise clients who need documented assurance that their service providers won't introduce risks to their financial statement accuracy.

SOC 2

SOC 2 Certification Overview


Origin


SOC 2 (Service Organization Control 2) was developed by the American Institute of Certified Public Accountants (AICPA) in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security evaluations as businesses increasingly moved to cloud-based services and outsourced IT operations. The AICPA developed SOC 2 to provide a framework that service providers could use to demonstrate their commitment to protecting customer data across five "Trust Service Criteria": security, availability, processing integrity, confidentiality, and privacy.


Industry Value


SOC 2 certification has become a critical trust signal in the technology and service provider industry, particularly for SaaS companies, cloud hosting providers, and data centers. Organizations value SOC 2 compliance because it provides third-party validation that a vendor has implemented appropriate controls to protect sensitive data, reducing the risk and liability associated with outsourcing. For service providers, achieving SOC 2 compliance is often a competitive necessity, as many enterprise customers and partners require it before entering into business relationships. The certification helps streamline vendor security assessments, as clients can rely on the audited report rather than conducting their own lengthy security reviews.

SOC 3

SOC 3 Certification


SOC 3 (System and Organization Controls 3) was created by the American Institute of Certified Public Accountants (AICPA) as part of their Service Organization Control reporting framework. Developed alongside SOC 1 and SOC 2 reports, SOC 3 emerged as the public-facing version of the SOC 2 report, designed to provide a general-use report on controls at service organizations. The AICPA introduced these frameworks to establish standardized criteria for evaluating and reporting on the security, availability, processing integrity, confidentiality, and privacy of systems that service organizations use to process user data.


For penetration testing and cybersecurity companies, SOC 3 certification is highly valued because it demonstrates to potential clients that the firm has undergone independent third-party assessment of its security controls and business practices. Unlike the detailed SOC 2 report which is restricted and shared only under NDA, SOC 3 reports can be freely distributed and displayed publicly, making them excellent marketing tools for cybersecurity firms to showcase their commitment to security. When a penetration testing company holds SOC 3 certification, it signals to clients that the firm protecting their most sensitive data and conducting security assessments has itself been validated to maintain rigorous internal controls—essentially proving they practice what they preach and can be trusted with access to critical systems and confidential information.

HITRUST

HITRUST Cybersecurity Certification


Origin


HITRUST (Health Information Trust Alliance) was founded in 2007 by a collaboration of healthcare, technology, and information security leaders. The organization created the HITRUST Common Security Framework (CSF) to address the fragmented landscape of security and privacy regulations facing the healthcare industry. Recognizing that healthcare organizations were struggling to comply with multiple frameworks like HIPAA, PCI-DSS, and ISO standards simultaneously, HITRUST developed a unified, certifiable framework that harmonizes these various requirements into a single comprehensive standard.


Industry Value and Importance


The HITRUST CSF certification has become the gold standard for demonstrating security and compliance in healthcare and beyond, now extending to financial services, retail, and other regulated industries. Organizations value HITRUST certification because it provides a standardized, risk-based approach that satisfies multiple regulatory requirements at once, reducing audit fatigue and compliance costs. The certification is particularly trusted by business partners and customers as third-party validation of an organization's security controls, often becoming a prerequisite for vendor relationships and contracts. Its prescriptive control requirements and rigorous assessment process make it more comprehensive than self-attestation models, giving stakeholders greater confidence in an organization's security posture.

Fedramp

FedRAMP Certification


Origin


The Federal Risk and Authorization Management Program (FedRAMP) was created by the U.S. federal government in 2011 through a collaborative effort between the General Services Administration (GSA), the Department of Homeland Security (DHS), and the Department of Defense (DoD). It was established to provide a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies. The program emerged from the need to ensure consistent security standards across government cloud deployments while eliminating redundant agency-by-agency security reviews, which were costly and time-consuming.


Industry Value


FedRAMP certification is highly valued in the industry because it represents one of the most rigorous security standards available for cloud service providers. Achieving FedRAMP authorization demonstrates that a vendor has met stringent security requirements based on NIST guidelines and has undergone thorough third-party assessment, making it a trusted benchmark not only for government contracts but also for private sector organizations seeking high-security cloud solutions. The certification significantly expands market opportunities for cloud providers, as it is mandatory for companies wanting to sell cloud services to U.S. federal agencies, and it streamlines the procurement process by allowing multiple agencies to leverage existing authorizations rather than conducting separate reviews.

MRC
Webtrust