How We Help
Federal
Resource Library
Events
About Us
Contact Us
More
June 24, 2019
|
Brooke Gardner
As a follow up to a whitepaper previously written by The Mako Group’s Chief Audit Executive, Shane O’Donnell, let’s dig a little deeper into what you should be reviewing when you receive your vendors’ SOC 1, SOC 2, or SOC 3 reports.
Each SOC report follows a basic outli...
December 2019 (1)
October 2019 (1)
September 2019 (3)
August 2019 (1)
July 2019 (1)
June 2019 (1)
May 2019 (1)
March 2019 (4)
December 2018 (1)
July 2018 (1)
December 2017 (1)
October 2017 (1)
September 2017 (1)
August 2017 (1)
December 2016 (1)
June 2015 (1)
March 2015 (2)
February 2015 (2)
October 2014 (1)
July 2014 (1)
April 2014 (1)
March 2014 (1)
Business
CSASummit
Censys
Compliance
Controls
Controlsincloud
Cybersecurity
Cybersecurityprogram
FFIEC
Guidance
HIPAA
IT
Malware
MosconeCenter
NIST
RSA
RSA2019
RSAConference
Risk
SOC
SOC 1
SOC 2
SOC 3
SOC Report
SOC testing
Security
SureCloud
Windows XP
breach
channelpartners
cloud
cloudmigration
controls
cyberfundamentals
cybersecurity
email
financial
legal
malware
newemployee
phishing
propercontrols
scams
secure
security
sony
strategicaccountexecutive
technology