Capital One’s recent data breach is only the latest in the perennial series of high-profile data breaches that have occurred in the last few years. What do Equifax, Home Depot, Target, and others have in common? Great security programs with high-quality and competent people running them. These companies experienced data breaches despite putting forth their[…]
My business partner and co-founder at risk3sixty, Christian White (CW), is a West Point graduate and former Ranger-qualified Captain in the U.S. Army. He served under some amazing leaders (like Rob Campbell who wrote a book about leadership called “It’s Personal not Personnel“) and had the opportunity to lead and develop hundreds of men and[…]
Are Pen Test and Vulnerability Scans Required for a SOC 2 Report? There has been much confusion lately in the SOC 2 market as companies seek to understand the need-to-haves vs. the nice-to-haves when it comes to obtaining a SOC 2 report. Much of this confusion was brought about by the December 2018 upgrade of the Trust Services Criteria, and associated Point of Focus, intended to align SOC 2 with the 2013 COSO framework.
Overview of the SOC for Cybersecurity In 2017 the AICPA published guidance on a new cyber security risk management examination, System and Organization Controls for Cyber Security (SOC for Cybersecurity). This SOC for Cybersecurity examination was created to address the growing need for reporting and attestation over an organization’s cyber security posture. The SOC for[…]
A major cyberattack took place this past week. The attack impacted organizations in over 100 counties including the British National Health Service, FedEx, Spanish telecom company, Telefónica, and multiple universities in Asia. The culprit is the Wannacry ransomware worm. The worm is most commonly introduced through infected email. When the user clicks on the infected[…]