๐๐ฅ๐ฅ ๐๐ฆ๐ฉ๐ฅ๐จ๐ฒ๐๐๐ฌ ๐ฆ๐ฎ๐ฌ๐ญ ๐๐จ๐ฆ๐ฉ๐ฅ๐๐ญ๐ ๐ญ๐ก๐ ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฐ๐๐ซ๐๐ง๐๐ฌ๐ฌ ๐ญ๐ซ๐๐ข๐ง๐ข๐ง๐ ๐ฐ๐ข๐ญ๐ก๐ข๐ง ๐๐ ๐๐๐ฒ๐ฌ ๐จ๐ ๐จ๐ง๐๐จ๐๐ซ๐๐ข๐ง๐ ๐๐ง๐ ๐๐ง๐ง๐ฎ๐๐ฅ๐ฅ๐ฒ ๐ญ๐ก๐๐ซ๐๐๐๐ญ๐๐ซ.Sound familiar? Despite being a hard requirement and many organizations spending thousands of dollars on implementing the Learning Management System (LMS), tracking completion rates, and sometimes enforcing sanctions for not completing the training – this has always been a point…
Tag: SOC 2
Compliance โ Security
As we enter the new year, many of us will start the annual third-party attestations. Itโs important toย remember that holding a third-party attestation provides a baseline assurance on the effective implementation of management, operational, and technical controls. Compliance demonstrated by a clean SOC 2 report, ISO 27001 certification, HITRUST certification, etc. does not equate to…
12 must-have policies and procedures for ISO 27001 & SOC 2 audit
As we discussed in an earlier post, the primary requirement for a SOC 2 audit is when a company provides services to a third party. As per the AICPA, the SOC 2 consists of the following Trust Services Principles (TSPs): Security (also known as Common Criteria) Availability Processing Integrity Confidentiality Privacy The scope for each…
Why do we need Governance Frameworks, SOC 2 Audits, & Compliance?
Yesterday I met my previous roommate who’s a Computer Science nerd and recently completed his internship at one of the best tech companies in the Valley. We met after a long time and soon after discussing how we’ve been, he asked about my work. I told him – “I am currently working on the Governance…