Audit & Assurance
To effectively use this critical security content, you need to do two things; become a CIS member, (it costs nothing and offers tremendous value), and two, become a contributor and participant.
Center For Internet Security Critical Security Controls V.6.1
AICPA Service Organization Control Reports - SOC 2
“If your company currently uses third-party vendors to provide services that include the collection, processing and/or retention of sensitive information, you should consider inquiring into whether they have successfully completed a SOC 2 Type 2 audit, as it helps to ensure a higher standard for protecting your data.” Jeanne Madden, Vice President Operations, ADP Tax Credit Services
Networking and Security concepts are critical to assessing security policy in networked and cloud environments.
The foundations of Control Objectives for Information Technology, or Cobit, are especially useful in planning for or assessment of any governance program. Now superceded by Cobit 5, the Cobit 4 curriculum offers relevant learning. For more information about trainings in IT Governance, visit https://ISACA.org or http://ITpreneurs.com
Thank you for your interest in EnterpriseGRC Solutions.
We look forward to serving your needs.