Information Security Management Series: Making Sense of the Regulatory Alphabet Soup

by Sarah Harvey / December 16, 2022

Have you heard of SOC 1, SOC 2, HIPAA, PCI, FISMA, or ISO 27001/27002 frameworks but are unsure of what they entail? Have you been asked for verification of regulatory compliance but don’t know where to begin? This webinar will educate you on the basics of these frameworks so that you are better equipped to discuss your compliance goals with prospects and clients, and are also more informed on your…

Man working on computer

Information Security Management Series: Risk Assessment

by Sarah Harvey / November 20, 2023

Are you wondering why a risk assessment is so important? Do you need more information about how to conduct a risk assessment? If it is your first time conducting a risk assessment, or if you are looking for a way to simplify your risk assessment process, follow these nine steps: Asset Characterization: Identify your organization’s assets such as hardware, software, human resources, data, and processes. Threat Identification: Detect either man-made or…