What to Expect with SOC 2®
Pratum has years of experience assisting companies with their SOC 2® process, and this document provides an overview of what we’ve learned about helping companies get a favorable report on the first try.
10 Most Common Information Security Risks
We asked our consulting team to list the 10 most common risks they see among their clients and put them together in this paper. These areas represent the places our consultants typically tell clients to focus when they want to make the biggest difference in their security posture in the shortest period of time. These are the high-ROI jobs that should move to the front of your IT team’s to-do list.
Employee Security Training Planner
This planner will help your organization to develop an effective security awareness and training program.
Trends in Electronic Evidence
In this paper, a U.S. Chief Magistrate Judge explains what she's looking for from attorneys and offers tips on how both sides in a case can winnow their work down to the ESI (electronically stored information) that really matters.
Best Practices for Information Security Risk Assessments
This paper provides everything you need to know about this essential review from planning to execution to follow-up.
Digital Forensics Use Cases
Use this guide to understand how a digital forensics investigator can support your work in a variety of legal scenarios.
An IT Director's Guide to Communicating Security Needs to the Executive Team
This paper discusses effective ways to communicate security concerns and solutions to the executive team – providing talking points and suggestions.
An IT Manager's Guide to a Successful Audit
This paper provides an overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.
Four Essentials for Every Cybersecurity Plan
Follow these recommendations for password policies, network management, data security, and social engineering to help lay the groundwork for policies that protect your systems, your data and your organization's future.
First Steps in Compliance Initiatives | Risk Assessments and Policies
Compliance is not a technology problem, it is a business problem. So many times we look to technology to solve all of our problems, but the real solution comes from our policies, procedures and documentation. Download this Paper to get 6 Helpful Tips for Improving Your Policy Writing Process.