Загрузка страницы

SOC 2: Everything You Need to Get a SOC 2 Report

This webinar covers the basics of a SOC 2 report, what to expect during a SOC 2 audit, and why a SOC 2 report may make sense for your organization.

#SOC2 #cybersecurity #Compliance

Download our Free Whitepaper - The Business Case for a SOC 2 Report: https://risk3sixty.com/whitepaper/business-case-for-soc-2/
0:00 Introduction
1:05 SOC 2 Background and History
5:05 SOC 2 Scoping
8:25 SOC 2 Readiness and Audit Process
12:50 Typical Readiness and Audit Timeline
16:25 Typical Effort Breakdown by Resource
18:35 SOC 2 Tips and Commonly Asked Questions
30:25 Free Resources and Contact Information

Видео SOC 2: Everything You Need to Get a SOC 2 Report канала risk3sixty
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
19 июня 2020 г. 21:35:26
00:31:15
Другие видео канала
Using SOC 2 to Comply with Multiple Compliance Frameworks Like ISO 27001, HIPAA, and GDPRUsing SOC 2 to Comply with Multiple Compliance Frameworks Like ISO 27001, HIPAA, and GDPRPrivacy Clauses in Contracts: What Should You Look Out for in ContractsPrivacy Clauses in Contracts: What Should You Look Out for in ContractsHow HITRUST Fuels Growth for B2B SaaS CompaniesHow HITRUST Fuels Growth for B2B SaaS CompaniesCybersecurity Brief: Ransomhub Keeps Busy, BEC hits $55B, and Who's to Blame for CrowdStrikeCybersecurity Brief: Ransomhub Keeps Busy, BEC hits $55B, and Who's to Blame for CrowdStrike#33: risk3sixty 5 Year Anniversary (w/ Co-founder Christian White)#33: risk3sixty 5 Year Anniversary (w/ Co-founder Christian White)Cybersecurity Executive Brief: Microsoft mandatory MFA for Azure, National Public Data breachCybersecurity Executive Brief: Microsoft mandatory MFA for Azure, National Public Data breachHow Security Leaders Can Upgrade to Business Leaders (w/ Matthew Sharp)How Security Leaders Can Upgrade to Business Leaders (w/ Matthew Sharp)How to Build a Security Program: Strategic Planning (Part 1 of 4)How to Build a Security Program: Strategic Planning (Part 1 of 4)HITRUST: How to Get HITRUST CertifiedHITRUST: How to Get HITRUST CertifiedHow to do better security assessments (w/ Amanda “Jo” Erven)How to do better security assessments (w/ Amanda “Jo” Erven)ISO 27001 Explained: A.5.1 Information Security PolicyISO 27001 Explained: A.5.1 Information Security PolicyPentest Engagement Types: A Guide to Understanding Simulated Attack TypesPentest Engagement Types: A Guide to Understanding Simulated Attack Types#18: Gap Selling, Improv Comedy, and Happiness at Work (with Happiness Consultant Brooklyn Dicent)#18: Gap Selling, Improv Comedy, and Happiness at Work (with Happiness Consultant Brooklyn Dicent)Cybersecurity Brief: Microsoft Patches 3rd Update Vulnerability in a Month, Malvertising Hits LowesCybersecurity Brief: Microsoft Patches 3rd Update Vulnerability in a Month, Malvertising Hits LowesCybersecurity Brief: Coalition for Secure AI and AMD Chips Vulnerable to SMM BypassCybersecurity Brief: Coalition for Secure AI and AMD Chips Vulnerable to SMM BypassCybersecurity News: Snowflake Incident Continues to Grow, Microsoft Recall Security ExposuresCybersecurity News: Snowflake Incident Continues to Grow, Microsoft Recall Security ExposuresThis is risk3sixtyThis is risk3sixty#43: Mass Surveillance, Data Harvesting, and Freedom (w/ Virginia MacSuibhne)#43: Mass Surveillance, Data Harvesting, and Freedom (w/ Virginia MacSuibhne)Cybersecurity Trends: Results of the last 1000 Security AssessmentsCybersecurity Trends: Results of the last 1000 Security AssessmentsThe Business Case for HITRUST i1The Business Case for HITRUST i1Cybersecurity News: Palo Alto PAN-OS Vulnerability & Sisense Security IncidentsCybersecurity News: Palo Alto PAN-OS Vulnerability & Sisense Security Incidents
Яндекс.Метрика