Services
http://www.enisa.europa.eu/publications
http://www.enisa.europa.eu/publications
- Details
- Written by Robin Basham
- Category: Services
- Hits: 4345
This is -- Scott Schnoll, Senior Program Manager, Office 365 Customer Experience
If this is the information you seek to properly implement or audit Microsoft Office 365, Go back to the source
We've thoroughly consumed this information because we are an Office 365 shop. If you have clients using 365, or if you are using Microsoft products, then you should too.
Read more: Office 365 Audited Controls for NIST 800-53A (Rev. 4)
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 4103
This is an iframe. The CSA site uses cookies. Please identify the important content from this frame and then go directly to the CSA site for more information.
Read more: GRC Stack CSA Initiative
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3063
To effectively use this critical security content, you need to do two things; become a CIS member, (it costs nothing and offers tremendous value), and two, become a contributor and participant.
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 7284
Center For Internet Security Critical Security Controls V.6.1
Read more: Center For Internet Security Critical Security Controls
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 4219
AICPA Service Organization Control Reports - SOC 2
“If your company currently uses third-party vendors to provide services that include the collection, processing and/or retention of sensitive information, you should consider inquiring into whether they have successfully completed a SOC 2 Type 2 audit, as it helps to ensure a higher standard for protecting your data.” Jeanne Madden, Vice President Operations, ADP Tax Credit Services
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3199
Can you translate your product or industry to the most current regulatory requirements? Can you map your capabilities to the compliance problems you solve? GRC is broken. We can fix it. We tie out your security investment to your security and risk response. With over 150 analyzed products, 5000 systems policies and current models for seven major sectors, you can resolve your most perplexing regulatory challenges in just months.
If you have hundreds of security products and you can't map them to your regulatory requirements, our methodology will make this relatively easy to accomplish. If you have a product and you can't explain its capabilities to the security and compliance market, give us a call. An investment of less than 15K USD will reap guaranteed results.
Read more: What Is My Regulatory DNA?
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 5348
Networking and Security concepts are critical to assessing security policy in networked and cloud environments.
Read more: Networking & Security Monitoring Concepts
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3694
Read more: CIS CSC and NIST CSF is the 80 in the 80/20 rule
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3731
Read more: Cloud Impacts Business
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3170
Assessment Services - EnterpriseGRC Solutions, Implementing a Compliance Framework
Read more: Compliance Assessment
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3172
The foundations of Control Objectives for Information Technology, or Cobit, are especially useful in planning for or assessment of any governance program. Now superceded by Cobit 5, the Cobit 4 curriculum offers relevant learning. For more information about trainings in IT Governance, visit https://ISACA.org or http://ITpreneurs.com
Read more: Sarbanes-Oxley Compliance - CobiT and COSO
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Audit & Assurance
- Hits: 3324
Often those unfamiliar with building a comprehensive Business Continuity Program will not be aware that just downloading and filling in a template from the internet to check a task box is not the appropriate solution for protecting your business. Using the 12 components for Business Continuity Planning and maturing over time through exercising and continuous improvement practices will increase the chances of recovery in times of crisis.
Read more: Business Continuity Program Framework and Supply Chain Risk
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 4504
Read more: PANDEMIC AND INFECTIOUS DISEASE PLANNING - New Rules for an Ongoing Threat
- Details
- Parent Category: Services
- Category: Business Continuity
- Hits: 7653
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 5143
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 3449
CHALLENGE - NIST Cybersecurity Framework for Improving Critical Infrastructure
Read more: Catastrophic Becomes Routine - NIST Cybersecurity and Critical Infrastructure
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 4603
Notes from Attendees Workshop, ISACA SV - The Next Great Outage
Read more: General Computing Controls to Cloud & Virtualized Environments
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 3125
Cloud Computing is easily the highest rated topic in current technology design, implementation, and control. No successful enterprise will circumvent the use of virtualization.
Read more: Virtualization Risks
- Details
- Written by Robin Basham
- Parent Category: Services
- Category: Business Continuity
- Hits: 3825
Innovation and Strategy - By Barbara Adey
Read more: You Need an Innovation Strategy
- Details
- Parent Category: Services
- Category: CyberSecurity IT RoadMap
- Hits: 2533