What Is CUI Basic (and How Does It Differ from CUI Specified)? Compliance & Certification Ian Terry March 17, 2026
The SOC Audit Process for Healthcare Organizations Automation, Compliance & Certification Dave Zuk March 12, 2026
New Compliance Challenges in 2022 Announcements New Compliance Challenges in 2022 Read More » Anthony Jones August 10, 2022
Prepare a Great Written Assertion for Your SOC 1 Examination Compliance & Certification, Policies & Procedures Prepare a Great Written Assertion for Your SOC 1 Examination Read More » Bernard Gallagher August 10, 2022
The Best SOC 1 Reporting Approach Compliance & Certification, Cybersecurity Assessments The Best SOC 1 Reporting Approach Read More » Bernard Gallagher August 10, 2022
Powerful Tools for Weighing Positive Risk & Negative Risk Risk Management Powerful Tools for Weighing Positive Risk & Negative Risk Read More » David Dunkelberger August 10, 2022
Disaster Recovery Terms Glossary Disaster Recovery Disaster Recovery Terms Glossary Read More » Anthony Jones August 9, 2022
The Power of Gap Analysis & Remediation for HITRUST CSF Certification Compliance & Certification, Cybersecurity Assessments The Power of Gap Analysis & Remediation for HITRUST CSF Certification Read More » Robert Godard August 9, 2022
HITRUST® Guidelines for Setting HIPAA-Compliant Passwords Cybersecurity Assessments HITRUST® Guidelines for Setting HIPAA-Compliant Passwords Read More » Robert Godard August 9, 2022
Coming Soon: A Single Track to EU Cybersecurity Certification in the Cloud Cloud Security Coming Soon: A Single Track to EU Cybersecurity Certification in the Cloud Read More » David Dunkelberger August 9, 2022
The Only GDPR Compliance Checklist that You Need Cybersecurity Assessments, Outsourced DPO The Only GDPR Compliance Checklist that You Need Read More » Bernard Gallagher August 9, 2022
3 Key Steps for Creating a Unified Control Framework to Simplify Compliance Policies & Procedures 3 Key Steps for Creating a Unified Control Framework to Simplify Compliance Read More » Anthony Jones August 9, 2022
HITRUST Implemented, 1-year (i1) Validated Assessment Now Available: Why It’s a Better Option Compliance & Certification HITRUST Implemented, 1-year (i1) Validated Assessment Now Available: Why It’s a Better Option Read More » Robert Godard August 9, 2022
What are Webtrust and Systrust? Network Security What are Webtrust and Systrust? Read More » Ian Terry August 9, 2022
The EU Cybersecurity Act and Its Effect on Businesses Cybersecurity The EU Cybersecurity Act and Its Effect on Businesses Read More » David Dunkelberger August 9, 2022
The Continuing Expansion of the Insurance Compliance Officer Role Outsourcing The Continuing Expansion of the Insurance Compliance Officer Role Read More » Bernard Gallagher August 9, 2022
PCI Security Standards Council Releases Best Practices for Securing E-Commerce Cybersecurity, Cybersecurity Training PCI Security Standards Council Releases Best Practices for Securing E-Commerce Read More » Anthony Jones August 9, 2022
What Is the FTC Red Flags Rule and Who Must Comply? Compliance & Certification What Is the FTC Red Flags Rule and Who Must Comply? Read More » Mike Mariano August 9, 2022
What is the CLOUD Act and Can It Impact Your Business? Cloud Security What is the CLOUD Act and Can It Impact Your Business? Read More » Anthony Jones August 9, 2022
The Advantages of ISO 50001 Certification & Upcoming Changes Compliance & Certification The Advantages of ISO 50001 Certification & Upcoming Changes Read More » Anthony Jones August 9, 2022
Understanding MARS-E Compliance: How Does It Affect You? Compliance & Certification Understanding MARS-E Compliance: How Does It Affect You? Read More » Robert Godard August 9, 2022
HITRUST CSF Assessment Preparation Guide Compliance & Certification, Cybersecurity Assessments HITRUST CSF Assessment Preparation Guide Read More » Robert Godard August 9, 2022
What Is the Direct Liability of Business Associates Under HIPAA Rules? Compliance & Certification, Cyber Threats What Is the Direct Liability of Business Associates Under HIPAA Rules? Read More » Robert Godard August 9, 2022
What Do We Mean by “Protected Health Information”? Cybersecurity What Do We Mean by “Protected Health Information”? Read More » Robert Godard August 9, 2022
An Overview of Complementary User Entity Controls Cybersecurity An Overview of Complementary User Entity Controls Read More » David Dunkelberger August 9, 2022
What Is a SOX Audit? Cybersecurity Assessments What Is a SOX Audit? Read More » Anthony Jones August 9, 2022
How Often Should You Have Your Database Updated? Network Security How Often Should You Have Your Database Updated? Read More » Ian Terry August 9, 2022
The Latest Network Segmentation Guidance and How It Might Affect Your PCI DSS Scope Network Security The Latest Network Segmentation Guidance and How It Might Affect Your PCI DSS Scope Read More » Anthony Jones August 9, 2022
How HITRUST Validated and Readiness Assessments Are Scored Compliance & Certification, Cybersecurity Assessments How HITRUST Validated and Readiness Assessments Are Scored Read More » Robert Godard August 9, 2022
Make Sure Your Team Is Meeting Compliance Controls & Processes Cybersecurity Training Make Sure Your Team Is Meeting Compliance Controls & Processes Read More » John DeCesare August 9, 2022
6 Steps to Help You Develop Your ISO 27001 Statement of Applicability Compliance & Certification, Cybersecurity Assessments 6 Steps to Help You Develop Your ISO 27001 Statement of Applicability Read More » Ian Terry August 9, 2022
Overview of the HITRUST CSF Readiness Assessment Cybersecurity Assessments Overview of the HITRUST CSF Readiness Assessment Read More » Robert Godard August 9, 2022
SSAE No. 21: New AICPA Engagement for ‘Direct Examination’ Business Continuity SSAE No. 21: New AICPA Engagement for ‘Direct Examination’ Read More » Bernard Gallagher August 9, 2022
How to Keep Employees and Your Organization PCI Compliant Cybersecurity Assessments, Cybersecurity Training How to Keep Employees and Your Organization PCI Compliant Read More » Ian Terry August 9, 2022
Would My Organization Benefit from the Utilization of a Third-Party Managed Security Service Provider? Cybersecurity Would My Organization Benefit from the Utilization of a Third-Party Managed Security Service Provider? Read More » Michael Katowitz August 9, 2022
Cybersecurity Post-Pandemic: Protecting Health Data from Rising Threats Cloud Security Cybersecurity Post-Pandemic: Protecting Health Data from Rising Threats Read More » Robert Godard August 9, 2022
Everything You Need for Your Next Disaster Recovery Audit Disaster Recovery Everything You Need for Your Next Disaster Recovery Audit Read More » Anthony Jones August 9, 2022
How Are DDoS Attacks Stopped? Cyber Threats, Cybersecurity How Are DDoS Attacks Stopped? Read More » Ian Terry July 29, 2022
Back to School: Strengthening Cybersecurity for Educational Institutions Cybersecurity Back to School: Strengthening Cybersecurity for Educational Institutions Read More » Joe Ciancimino July 29, 2022
When, Why, and How Often Should Vulnerability Scanning be Performed? Cybersecurity Assessments When, Why, and How Often Should Vulnerability Scanning be Performed? Read More » Mike Mariano July 26, 2022
NERC CIP & the Importance of Consistent Compliance Compliance & Certification, Cybersecurity Assessments NERC CIP & the Importance of Consistent Compliance Read More » Anthony Jones July 10, 2022
Behind the Scenes: What are the Hidden Costs of Ransomware Attacks? Cyber Threats Behind the Scenes: What are the Hidden Costs of Ransomware Attacks? Read More » Robert Agar June 22, 2022
Why, When & How Often Is Pen Testing Needed? Penetration Testing Why, When & How Often Is Pen Testing Needed? Read More » Ian Terry June 9, 2022
Pros and Cons of Relying on Firewall as a Service Cloud Security Pros and Cons of Relying on Firewall as a Service Read More » Philip LaRocca June 9, 2022
How Blockchain Boosts Cloud Security Cloud Security How Blockchain Boosts Cloud Security Read More » Robert Godard June 9, 2022
New Zero-Trust Cloud Security Models  Cloud Security New Zero-Trust Cloud Security Models  Read More » Mike Mariano April 27, 2022
Top Ways to Safeguard APIs Against Attacks Cloud Security, Cyber Threats Top Ways to Safeguard APIs Against Attacks Read More » Mike Mariano April 27, 2022
Understanding the Dangers of Cloud Security Alert Fatigue Cloud Security Understanding the Dangers of Cloud Security Alert Fatigue Read More » Mike Mariano April 26, 2022
How to Improve Your Cloud Security Posture Cloud Security How to Improve Your Cloud Security Posture Read More » Anthony Jones April 6, 2022
NIST Framework for Ransomware Protection Cyber Threats NIST Framework for Ransomware Protection Read More » Mike Mariano April 6, 2022
Penetration Testing for Web Applications Penetration Testing, Penetration Testing Penetration Testing for Web Applications Read More » Ian Terry September 11, 2021
6 Questions to Consider Before Launching Your Next Penetration Test Penetration Testing 6 Questions to Consider Before Launching Your Next Penetration Test Read More » Anthony Jones September 10, 2021
How to Choose the Right PCI-Compliance Approved Scanning Vendor Cybersecurity Assessments, Policies & Procedures How to Choose the Right PCI-Compliance Approved Scanning Vendor Read More » Anthony Jones August 15, 2021
Compliance and Security Naturally Work Together in Harmony for Your Business Compliance & Certification Compliance and Security Naturally Work Together in Harmony for Your Business Read More » John DeCesare August 15, 2021
Essential Guide to GLBA Compliance & Audits Compliance & Certification, Cybersecurity Assessments Essential Guide to GLBA Compliance & Audits Read More » Anthony Jones September 12, 2020
IS Partners, LLC Obtains Approval as HITRUST CSF Assessor Announcements IS Partners, LLC Obtains Approval as HITRUST CSF Assessor Read More » John DeCesare August 11, 2017
Compliance Assessment Tool Compliance & Certification Compliance Assessment Tool Read More » Tool David Dunkelberger
SOC 2 Self Assessment Quiz Cybersecurity SOC 2 Self Assessment Quiz Read More » Tool David Dunkelberger
Pen Test Cost Calculator Penetration Testing Pen Test Cost Calculator Read More » Tool David Dunkelberger
SOC 2 Readiness Assessment Checklist SOC 2 Readiness Assessment Checklist Read More » Checklist Prepare Your Organization for a Successful SOC 2 Audit
SOC 2 Compliance Checklist SOC 2 Compliance Checklist Read More » Checklist Comprehensive guide for achieving SOC 2 compliance
SOC 1 Bridge Letter Template SOC 1 Bridge Letter Template Read More » Template Essential document for maintaining SOC 1 compliance between audit periods
SOC 2 Bridge Letter Template SOC 2 Bridge Letter Template Read More » Template Essential document for maintaining SOC 2 compliance between audit periods
SOC 1 Auditor Selection Checklist SOC 1 Auditor Selection Checklist Read More » Checklist Essential guide for choosing the right CPA firm for your SOC 1 audit
Remote Work Policy Checklist for Remote Audit Success Remote Work Policy Checklist for Remote Audit Success Read More » Checklist Ensure Your Remote Work Security Measures Are Audit-Ready
PCI-DSS Audit Checklist PCI-DSS Audit Checklist Read More » Checklist Essential guide for Payment Card Industry Data Security Standard compliance
NIST Cybersecurity Framework Implementation Checklist NIST Cybersecurity Framework Implementation Checklist Read More » Checklist Essential guide for preparing for Cybersecurity Maturity Model Certification
ISO 27001 Compliance Maintenance Checklist ISO 27001 Compliance Maintenance Checklist Read More » Checklist Essential guide for maintaining ISO 27001 certification
HIPAA Compliance Checklist HIPAA Compliance Checklist Read More » Checklist Comprehensive self-evaluation tool for HIPAA compliance
CMMC Audit Checklist CMMC Audit Checklist Read More » Checklist Essential guide for preparing for Cybersecurity Maturity Model Certification
SOC 2 Report Template SOC 2 Report Template Read More » Template Comprehensive guide for SOC 2 compliance reporting
SOC 2 Vendor Compliance Checklist SOC 2 Vendor Compliance Checklist Read More » Checklist Comprehensive guide for achieving SOC 2 compliance
SOC 3 Compliance Checklist SOC 3 Compliance Checklist Read More » Checklist Essential guide for preparing for Cybersecurity Maturity Model Certification
SOC 2 Gap Assessment Checklist SOC 2 Gap Assessment Checklist Read More » Checklist Comprehensive guide for achieving SOC 2 compliance
HITRUST Compliance Checklist HITRUST Compliance Checklist Read More » Checklist Comprehensive self-evaluation tool for HIPAA compliance
Healthcare Data Security Checklist Healthcare Data Security Checklist Read More » Checklist A comprehensive tool for evaluating healthcare cybersecurity measures
SOC 1 Compliance Checklist SOC 1 Compliance Checklist Read More » Checklist Essential guide for preparing for SOC 1 Audit
Cybersecurity Compliance Checklist Cybersecurity Compliance Checklist Read More » Checklist Essential guide for preparing for cybersecurity compliance
PCI-DSS Certification Checklist PCI-DSS Certification Checklist Read More » Checklist Essential guide for Payment Card Industry Data Security Standard compliance
Cybersecurity Compliance Checklist – System Vulnerabilities Cybersecurity Compliance Checklist – System Vulnerabilities Read More » Checklist Essential guide for preparing for cybersecurity compliance
Cybersecurity Compliance Checklist – Prevent Cyber Attacks Cybersecurity Compliance Checklist – Prevent Cyber Attacks Read More » Checklist Essential guide for preparing for cybersecurity compliance
Dora Compliance Checklist Dora Compliance Checklist Read More » Checklist Essential guide for preparing for DORA Compliance Checklist