Information Security Blog

New Best-Practices Guide to eDiscovery Information Security Attestation

New Best-Practices Guide to eDiscovery Information Security Attestation

Hamilton, NJ (PRWEB) August 11, 2011

Pivot Point Security’s new eDiscovery Information Security Guide illustrates the various forms of information security attestation like vulnerability assessments, penetration tests, design reviews, gap assessments, SAS 70, ISO 27001, etc. The document also details cost, level of assurance, timing and the form of attestation in addition to a glossary for more details.

In a recent article explaining the differences between ISO 27001 and ISO 27002, John Verry (ISO 27001 Certified Lead Auditor at Pivot Point Security) asks, “How concerned are you about your Information Security posture? Are you trying to differentiate yourself from your competition?”

Curious about ISO 27001 and why customers are asking for it? Pivot Point Security is happy to offer many free resources about ISO 27001. For companies trying to dissect a particular problem, Pivot Point Security finds that a brief discussion can help clarify things more quickly than hours of research.

Are customers asking for security attestation? If not, it’s only a matter of time before they do. Pivot Point Security is seeing more clients being asked for attestation. That is why they developed the eDiscovery Information Security Guide. Visit the website, download the free eDiscovery Information Security Guide and ask for a conversation. Pivot Point Security makes it simple to know you’re secure and prove you’re complaint.


Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Free Whitepaper: Stop Wasting Money on Penetration Testing


Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Free Whitepaper: Five Best Practices for SIEM


The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Is ISO 27001 Right for (Y)our Organization?


Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

About the Author:

A Pivot Point Security Press Release

Add a Comment

Share This