Information Security Blog

Pivot Point Security Joins Shared Assessments Program

Pivot Point Security Joins Shared Assessments Program

Hamilton, NJ (PRWEB) April 03, 2012

shared-assessmentsPivot Point Security, a leading Information Security Assurance firm, announces that it has recently joined the Shared Assessments Program as an assessment firm member.

The Shared Assessments Program was created by leading financial institutions, accounting firms, and key service providers to inject standardization, consistency, speed, efficiency and cost savings into the vendor risk assessment process.

  • The Shared Assessments program provides an assessment of an organization’s implementation of its controls using a standardized questionnaire which is based on the ISO 27002 standard.
  • The program leverages a set of “Agreed Upon Procedures” which more rigidly define the approach to the 27002 Gap Assessment.  This approach allows service providers to undergo a single assessment , and then provide the results to multiple clients who have agreed to the process.

“We endorse the Shared Assessments Program approach as it simplifies the third party attestation process for service providers” says Mosi Platt, Lead Auditor at Pivot Point Security. “Because it is based on ISO-27002 we also see it as a logical stepping stone towards ISO-27001 certification, which is where most of our service provider clients are moving.”

Pivot Point Security has made extensive use of the Shared Assessments Program across a half dozen verticals prior to becoming a member. For example:

Catherine A. Allen, Chairman and CEO of The Santa Fe Group, commented on Pivot Point Security’s decision to join the Shared Assessments Program.  “We are excited to have a company with broad security assessment experience including expertise across ISO 27001/27002, HIPAA, , PII, and PCI, join the program.  We commend Pivot Point Security for becoming a member of the Shared Assessments Program and are pleased to see their dedication to working with others in the industry to simplify security assessments.“

For more information on the Shared Assessments Program and the service offering, please visit


Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Free Whitepaper: Five Best Practices for SIEM


The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Free Whitepaper: Stop Wasting Money on Penetration Testing


Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Is ISO 27001 Right for (Y)our Organization?


Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

About the Author:

Marketing at Pivot Point Security

Add a Comment

Share This