Timestamps ----- 0:05 - Intro + Framework Structure 3:10 - CC1 Control Environment 11:43 - CC2 Communication and Information 17:00 - CC3 Risk Assessment 24:09 - CC4 Monitoring Activities 28:20 - CC5 Control Activities 32:18 - CC6 System Access 48:45 - CC7 System Operations 59:00 - CC8 Change Management 1:02:55 - CC9 Risk Mitigation Free tools and Get a SOC 2 Report ----- www.phalanxgrc.com -- Assess and manage your whole SOC 2 program with our free tool! www.risk3sixty.com -- Let us help you with a SOC 2 report!
Good overview. Coupling soc 2 whether type 1 or type 2 with ISO 27001 depending on the functionality and needs of the organization is really helpful. Form that ISMS committe, make sure internal and external communication is there, adopt clear snd concise frequently reviewed policies and procedures and have a formal risk register that is communicated on a predetermined frequency up to the ISMS committee for actioning.
Great introduction! I’m a seasoned financial controller (CPA certified) looking to reroute careers to cybersecurity. What would you suggest as a great point of entry?
Timestamps -----
0:05 - Intro + Framework Structure
3:10 - CC1 Control Environment
11:43 - CC2 Communication and Information
17:00 - CC3 Risk Assessment
24:09 - CC4 Monitoring Activities
28:20 - CC5 Control Activities
32:18 - CC6 System Access
48:45 - CC7 System Operations
59:00 - CC8 Change Management
1:02:55 - CC9 Risk Mitigation
Free tools and Get a SOC 2 Report -----
www.phalanxgrc.com -- Assess and manage your whole SOC 2 program with our free tool!
www.risk3sixty.com -- Let us help you with a SOC 2 report!
Can you pls upload the doc for reference?
14 comments, 11 of them asking for the spreadsheet that you referenced. That doesn't look good.
Good overview. Coupling soc 2 whether type 1 or type 2 with ISO 27001 depending on the functionality and needs of the organization is really helpful. Form that ISMS committe, make sure internal and external communication is there, adopt clear snd concise frequently reviewed policies and procedures and have a formal risk register that is communicated on a predetermined frequency up to the ISMS committee for actioning.
Hello there - the document you indicated you'd share, isn't in the description
Requirements of SOC 2 were explained well
Great introduction! I’m a seasoned financial controller (CPA certified) looking to reroute careers to cybersecurity. What would you suggest as a great point of entry?
Hi very insightful session, please help us with the doc for reference :)
anybody got the spreadsheet?
Such a great video ! this has helped me so much
Hi, where can I get the spreadsheet? It isn't in the video description or the website that I could find.
whre do I get that document ? no link for reference
Hi, how do we get the spreadsheet?
Very insightful, please how can I get this document?
Great intro, how can we get the sheet ?
Can you share the document download?
I don't see the spreadsheet posted. Where can I download a copy?
I would also like to have access to this worksheet, how could I get it?
can i get the document?
Anyone ever got the document?
Great Stuff. Much appreciated