Austin Songer
  • Home
  • Compliance Products
  • Youtube Channel
  • Support
  • Follow
    Subscribe to Austin Songer
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
SOC 2:  Importance of Stakeholders Collaboration
GRC

SOC 2: Importance of Stakeholders Collaboration

HIPAA Expected Evidence
GRC

HIPAA Expected Evidence

Audit Principles and Concepts
GRC

Audit Principles and Concepts

Evidence Gathering Recommendation: Adding TimeStamp To Screenshots
GRC

Evidence Gathering Recommendation: Adding TimeStamp To Screenshots

2 January 2023
Mapping Security Controls to the HITRUST framework
GRC

Mapping Security Controls to the HITRUST framework

23 December 2022
SOC 2: Selecting a SOC 2 Auditor
SOC2

SOC 2: Selecting a SOC 2 Auditor

22 December 2022
SOC 2: Overcoming Common Roadblocks
SOC2

SOC 2: Overcoming Common Roadblocks

21 December 2022
SOC 2 Audit Process

SOC 2 Audit Process

21 December 2022
Slack Best Practices Part 1: Channel Naming

Slack Best Practices Part 1: Channel Naming

19 October 2022
ISO 27001:2022
compliance

ISO 27001:2022

25 August 2022
SOC2 Vendor Management Policy

SOC2 Vendor Management Policy

22 August 2022
SOC2 Workstation Policy
compliance

SOC2 Workstation Policy

Loading...
By Austin Songer 22 Aug 2022
List of Information Security Metrics to Track
Security Governance

List of Information Security Metrics to Track

Organizational * Information Security Budget as Percentage of IT Budget * Information Security Budget Spend Breakdown * Percentage of Users With Security Exceptions * Percentage of Staff Fully Trained
By Austin Songer 15 Aug 2022
Risk Catalogue
Risk

Risk Catalogue

RISK CATALOG use case: * What are the risks associated with a control deficiency? (e.g., if the control fails, what risk(s) is the organization
By Austin Songer 10 Aug 2022
Threat Catalogue
Risk

Threat Catalogue

THREAT CATALOG use case: What natural and man-made threats affect control execution? (e.g., if the threat materializes, will the control function as expected?) Definition
By Austin Songer 10 Aug 2022

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

Elastic (14) GRC (12) compliance (11) SOC2 (9) Audit (8) Linux (8) Ubuntu (6) firewall (5) Wazuh (5) azure (5) security (4) sudo (4)
Copyright 2023, Austin Songer. All Rights Reserved. Design with by @GodoFredoNinja
Austin Songer

  • Home
  • Compliance Products
  • Youtube Channel
  • Support

Log in Sign up

Follow
Search suggestions