Remove Application Remove Consulting Remove Gap Analysis
article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

Once the ISO 27001 audit is complete, the auditor gives the organization a Statement of Applicability (SOA) summarizing its position on all security controls. It is separated into four components covering user access to data, systems, and applications. How Do You Perform a Gap Analysis? Cryptography, A.10

article thumbnail

Audit Checklist for SOC 2

Reciprocity

.” The most prevalent types of service organizations to which the SOC applies include, but are not limited to: Software as a service (SaaS) businesses that offer software, applications, and websites. Companies that manage, assist, or consult on money or accounting processes. Perform a SOC 2 Gap Analysis.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

‘Special Publications’ take a deeper dive into specific areas Beyond the core framework, NIST has published over 200 special documents addressing various facets of cybersecurity risk management, ranging from identity access control and protective technology management to incident response and artificial intelligence applications.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

‘Special Publications’ take a deeper dive into specific areas Beyond the core framework, NIST has published over 200 special documents addressing various facets of cybersecurity risk management, ranging from identity access control and protective technology management to incident response and artificial intelligence applications.