This week, the guys reach the epic conclusion of the SOC 2 audit preparation series. They finish the Security Trust Services Criteria, discussing Control Categories 7,8, & 9. They also share tips and tricks to succeed with your SOC 2 audit.
This week, the guys reach the epic conclusion of the SOC 2 audit preparation series. They finish the Security Trust Services Criteria, discussing Control Categories 7,8, & 9. They also share tips and tricks to succeed with your SOC 2 audit.
This week, the guys return to helping you prepare for your SOC 2 audit. This time, they discuss Control Categories 5 and 6 in the Security Trust Services Criteria. They cover risk management controls and answer the question, "How does hosting in the cloud help with the audit?"
We all know that data breaches are nightmares and the legal ramifications can be far worse than the breach itself. So what can we do to protect ourselves? This week, Zach and Mike welcome attorney John Gray, Chair of Data Privacy and Cybersecurity of Lewis Roca, who specializes in Data Privacy law. He shares how companies can prepare in advance to reduce the legal ramifications often associated with cyber attacks. He also covers issues around nation-state threat actors and various malicious activities in today's environment.
Web applications are drastically different and like anything, are prone to vulnerabilities. Application penetration tests come in all shapes and sizes, some good, some bad, and some are not even penetration tests at all. This week, the guys share their insights about Web Application Penetration Testing and get what you need out of your next test! Do not miss this episode if you are planning a web application penetration test for the first time!
As we get deeper into the SOC 2 Preparation series, the guys discuss the controls around monitoring activities, tracking deficiencies, and assessing results (CC 4). If a SOC 2 audit is in your future, be sure to catch all the SOC 2 audit readiness episodes!
This week, the guys continue their series on how to prepare for your SOC 2 audit by discussing controls in Section 3 of the Security Trust Services Criteria. If your organization is about to undergo a SOC 2 audit or looking into it, be sure to catch all the SOC 2 audit readiness episodes!
Planning to go through your very first SOC 2 audit? If so, this series will be a binge worthy and enlightening adventure! This week, the guys walk you through the first few SOC 2 audit requirements with a step-by-step approach. They share what your auditor will be looking for, tips to prepare, and the pitfalls that might catch you off guard.
The development of a cybersecurity committee will accelerate your company's alignment to a cybersecurity framework and compliance requirements.
This week, the guys discuss why you may need a committee for your cybersecurity framework adoption, instead of leaving one person to lead the job.
They also cover operational tempo with a 12-month calendar example to accelerate your progress and maintain compliance.
This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely.
For more on Ken and Silverdraft, please see the links below.
This week, the guys talk about navigating the cybersecurity environment in 2023. From advancements and changes to cybersecurity practices, to economic conditions shifting budget priorities, to advancing your own career, this conversation is the primer for a great year! Start off strong and don't miss this episode!
Silent Sector® builds and strengthens exceptional cybersecurity programs for US-based mid-market and emerging companies.
Expertise-Driven Cybersecurity®