
SOC 2 Video Series
How can you prove you’re not an at-risk vendor? How can you give your clients the assurance they need that you’re protecting their critical assets? SOC 2 audits help to address third-party risk concerns by evaluating internal controls, policies, and procedures that directly relate to the security of a system at a service organization.
Our video series on SOC 2 reports covers everything from determining who should have a SOC 2 audit performed, selecting appropriate Trust Services Principles, and understanding the SOC 2 audit process itself.

SOC 2 Type 1 vs Type 2: What’s the Difference?

SOC 2 Report Criteria and FAQs

What Will Be in My SOC 2 Report?

What is the Purpose of the SOC 2 Privacy Principle?

What Is The SOC 2 Security Principle?

Selecting SOC 2 Trust Service Principles

Why am I Being Asked about SOC 2 Compliance?
