Ed-Keck_Web

Edward Keck, Jr.

MBA, CISSP Partner, Lead, Cybersecurity Consulting Services

Get to Know Me

Ed is a Partner leading Withum’s Cybersecurity Consulting Services practice. He has over 30 years of cybersecurity experience across the healthcare and manufacturing industries, with 20 years specifically focused on cyber and information security for financial services.

Ed’s knowledge spans maintaining domestic and international cybersecurity program development and operations. As a Certified Information System Security Professional (CISSP), Ed helps clients strengthen business operations involving Cybersecurity, Data Privacy and Regulatory Compliance, Physical Security, 3rd Party Risk Management, Operational Risk, and Enterprise Risk Management.

Prior to joining Withum, Ed was a Managing Director in the Integrated Cyber Practice at a Big 4 Accounting Firm. He also led a cybersecurity and operational risk practice at a management consulting firm. A forerunner in his industry, Ed was a founding member of the IBM Information Governance Council.

Industry Expertise

Service Expertise

Learn More About My Story

Learn more about my professional experience and how I spend my time outside the firm.

Education:

  • Master’s Degree, Business Administration, Cleveland State University
  • Management Information Systems, Capitol University, Cleveland, OH
  • Computer Science, John Carroll University, University Heights, OH

Professional Affiliations:

  • Member, Information Systems Security Certification Consortium (ISC)²

Ed is respected thought leader in the industry and has co-authored and published points of view and articles on cybersecurity, privacy, GDPR, effective governance, and board reporting.

Ed and his family are active in their church and support multiple local charities. They coordinated a backpack for the homeless drive during the holidays for over 5 years that brought needed clothing packed into a new backpack for homeless men and women in Cleveland. Each year approximately 150 men and women received new items at the holidays.

Ed has been married to his wife Lisa for 28 years, and they have three children. When not working Ed enjoys watching sporting events (football and baseball are his favorites), playing golf, and traveling.

Authored Insights

Read more
cybersecurity concept
Cybersecurity Best Practices FAQ: Everyday Measures for a More Secure Business

Cybersecurity risks evolve quickly and organizations continue to look for practical ways to put cybersecurity best practices into action. This FAQ distills key guidance from our cybersecurity team into clear, straightforward answers and cybersecurity tips that help strengthen resilience. This FAQ covers: Cybersecurity FAQs 1. How often should I update and modernize my business software?…

Read more
cyber threat, cyber alert
Cybersecurity Alert: Expiration of Cyber Threat Sharing Law 

As of September 30, 2025, the Cybersecurity Information Sharing Act of 2015 (CISA) has expired without reauthorization. This cyber threat sharing law previously enabled and protected the voluntary sharing of cyber threat indicators between private entities and the federal government. Key Implications for Organizations Key Legal and Compliance Risks The expiration introduces a complex web…

Read more
cybersecurity
Why Cyber Risk Is Business Risk

Cybersecurity is no longer just a technical concern – it’s a core business risk management priority that directly affects operational continuity, client trust, and enterprise value. Foundational practices such as strong passwords, multi-factor authentication, phishing awareness, and regular system updates remain essential for every organization. But for executives and business owners, the stakes extend further….