Remove Activation Remove Consulting Remove Gap Analysis
article thumbnail

Building Resilience and Compliance in Finance: Insights from PagerDuty’s Lee Fredricks by Laura Chu

PagerDuty

To understand these challenges, we spoke with Lee Fredricks, Director of Solutions Consulting for EMEA at PagerDuty. The first step for most companies is a gap analysis to spot and address any weaknesses. DORA and the UK equivalents take long-standing expectations and turn them into a clear framework for compliance.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

The procedure entails defining which personnel should be responsible for particular activities to provide a uniform and efficient approach for responding to security incidents. Consult with your internal and external audit teams for a checklist template to use with ISO compliance or for basic security control validation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

Companies that manage, assist, or consult on money or accounting processes. Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis.

Audit 52
article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. Categories: Within each function, categories provide subdivisions related to cybersecurity outcomes and activities.