Introduced by the U.S. government in 2022, the Federal Information Security Management Act (FISMA) aims to protect information security, focusing on “risk-based policy for cost-effective security.” If you are a federal agency, contractor, or subcontractor looking to be FISMA certified, understanding the process is essential. The official guideline is a lengthy piece of legal jargon…
“Intense learning experience,” “Built my confidence,” “The impact is huge.”, “Well worth it!” This is how people who have attended the ISC2 Security Congress in the past have described it. The ISC2 Security Congress brings together cybersecurity professionals from around the world. If you haven’t attended it before, it is definitely worth attending in 2025….
If your organization has implemented ISO 27001, it must be audited by an accredited auditor to be certified. An ISO 27001 audit reviews your organization’s information security management system (ISMS) against a set of defined standards. Once you are certified, it does not stop there. Maintaining it involves more work, both for you and the…
Every business aiming to become SOC 2 (Service Organization Control) compliant must eventually engage with SOC 2 Auditors at the end of their SOC 2 audit readiness journey. Only a credible SOC 2 auditor such as a licensed CPA individual, or third-party consultant firm accredited by the American Institute of Certified Public Accountants (AICPA) can…
PCI DSS is for payment card data. It is seen as the gold standard for protecting sensitive authentication data and with PCI DSS 4.0 in effect the requirements have only become more stringent. The newer and stronger version was built after much input from the PCI Community, including 6,000+ comments from 200 companies and many…
According to the EY 2023 Third-party risk management (TRPM) Survey, 9 out of 10 respondents report having invested in a robust TRPM program. They are transitioning from risk identification to actively managing and mitigating them. This shift is driven by the increased dependency on vendors and rising third-party breaches. The research underscores that there is…