SOC 2: Everything You Need to Get a SOC 2 Report
This webinar covers the basics of a SOC 2 report, what to expect during a SOC 2 audit, and why a SOC 2 report may make sense for your organization.
#SOC2 #cybersecurity #Compliance
Download our Free Whitepaper - The Business Case for a SOC 2 Report: https://risk3sixty.com/whitepaper/business-case-for-soc-2/
0:00 Introduction
1:05 SOC 2 Background and History
5:05 SOC 2 Scoping
8:25 SOC 2 Readiness and Audit Process
12:50 Typical Readiness and Audit Timeline
16:25 Typical Effort Breakdown by Resource
18:35 SOC 2 Tips and Commonly Asked Questions
30:25 Free Resources and Contact Information
Видео SOC 2: Everything You Need to Get a SOC 2 Report канала risk3sixty
#SOC2 #cybersecurity #Compliance
Download our Free Whitepaper - The Business Case for a SOC 2 Report: https://risk3sixty.com/whitepaper/business-case-for-soc-2/
0:00 Introduction
1:05 SOC 2 Background and History
5:05 SOC 2 Scoping
8:25 SOC 2 Readiness and Audit Process
12:50 Typical Readiness and Audit Timeline
16:25 Typical Effort Breakdown by Resource
18:35 SOC 2 Tips and Commonly Asked Questions
30:25 Free Resources and Contact Information
Видео SOC 2: Everything You Need to Get a SOC 2 Report канала risk3sixty
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Using SOC 2 to Comply with Multiple Compliance Frameworks Like ISO 27001, HIPAA, and GDPRPrivacy Clauses in Contracts: What Should You Look Out for in ContractsHow HITRUST Fuels Growth for B2B SaaS CompaniesCybersecurity Brief: Ransomhub Keeps Busy, BEC hits $55B, and Who's to Blame for CrowdStrike#33: risk3sixty 5 Year Anniversary (w/ Co-founder Christian White)Cybersecurity Executive Brief: Microsoft mandatory MFA for Azure, National Public Data breachHow Security Leaders Can Upgrade to Business Leaders (w/ Matthew Sharp)How to Build a Security Program: Strategic Planning (Part 1 of 4)HITRUST: How to Get HITRUST CertifiedHow to do better security assessments (w/ Amanda “Jo” Erven)ISO 27001 Explained: A.5.1 Information Security PolicyPentest Engagement Types: A Guide to Understanding Simulated Attack Types#18: Gap Selling, Improv Comedy, and Happiness at Work (with Happiness Consultant Brooklyn Dicent)Cybersecurity Brief: Microsoft Patches 3rd Update Vulnerability in a Month, Malvertising Hits LowesCybersecurity Brief: Coalition for Secure AI and AMD Chips Vulnerable to SMM BypassCybersecurity News: Snowflake Incident Continues to Grow, Microsoft Recall Security ExposuresThis is risk3sixty#43: Mass Surveillance, Data Harvesting, and Freedom (w/ Virginia MacSuibhne)Cybersecurity Trends: Results of the last 1000 Security AssessmentsThe Business Case for HITRUST i1Cybersecurity News: Palo Alto PAN-OS Vulnerability & Sisense Security Incidents