Skip to main content

Resources

Entries for March 2019

SOC 2 vs. SOC for Cybersecurity Reports

Wednesday, March 27, 2019

SOC 2 vs. SOC for Cybersecurity Reports

There are a variety of different types of SOC reports, including SOC 1, SOC 2, and SOC 3, as well as the newest member of the team – the SOC for Cybersecurity. While each report has its own purpose, we’re going to dive into the difference between the SOC 2 and SOC for Cybersecurity reports.

Read More...

Categories: Blog

FTC Proposes Changes to GLBA Safeguards Rule

Friday, March 22, 2019

FTC Proposes Changes to GLBA Safeguards Rule

The first major changes to the GLBA and the Safeguards Rule have been proposed. On March 5th, 2019, the FTC announced proposed revisions to the Safeguards Rule, including an expansion of the companies covered by the Rule and requiring specific controls to secure customers’ information.

Read More...

Categories: Blog, In the News

Scoping Your IT Audit Based on Risk

Wednesday, March 20, 2019

Scoping Your IT Audit Based on Risk

"Scoping your IT Audit based on risk" is a phrase that’s thrown around a lot by IT Audit companies and examiners, but what does it really mean? How do you know if your IT Audit is truly risk-based, or if it’s based on an auditor’s idea of what security ought to be?

Read More...

Categories: Blog

A Guide to Performing Internal Social Engineering Testing

Wednesday, March 13, 2019

A Guide to Performing Internal Social Engineering Testing

Social engineering testing more than once a year is proven to be a beneficial way to keep employees alert and hold them responsible for their actions. Since hiring regular testing throughout the year is not an option for everyone, let’s go through some options for performing your own internal social...

Read More...

Categories: Blog

{TTS Webinar} Third Party and Fourth Party Management

Friday, March 1, 2019

Recording available. In recent years, financial institutions have seen a significant amount of new guidance on third party risk management and new terms coined such as Fourth Party Management. We will explore best practices for Vendor Management, Third Party Risk Management, Fourth Party Management ...

Read More...

Categories: Webinars, Webinar
Page 1 of 2First   Previous   [1]  2  Next   Last