Category: Governance, Risk, Compliance

SOC 2 vs HIPAA

1. Breach notifications SOC 2 has no specific breach notification requirements, but HIPAA sure does. HIPAA’s breach notification rule specifies how and when to notify

Read More

SIG, CAIQ, CCM and STAR

https://www.thirdpartytrust.com/blog/caiq-vs-sig-top-questionnaires-vendor-risk-assessment/ https://cloudsecurityalliance.org/research/cloud-controls-matrix/ (CSA) https://sharedassessments.org/sig/ Risk assessments, security questionnaires, vendor due diligence, and RFPs are strategic initiatives for organizations managing risk across growing and interconnected supply

Read More

CIS RAM (Risk Assessment Management)

CIS RAM conforms to and supplements established information security risk assessment standards and methods, such as ISO 270051, NIST Special Publications 800-302, and Risk Information

Read More

NIST CSF overview

https://www.isms.online/nist/ The National Institute of Standards and Technology (NIST) in the USA has produced a framework to help organisations align their cyber security defence planning and

Read More

Gap Analysis

Check: https://www.redlegg.com/advisory-services/governance-based-gap-assessments Gap Assessments are conducted for your benefit, to allow you to establish a baseline or understand how you would score in an audit

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.