• Social Menu
  • Social Menu
  • Social Menu
  • Social Menu
  • Services
    • CMMC Preparation
      • CMMC Compliance Services
    • ISO 27001
      • ISO 27001 Certification
      • ISO 27001 Maintenance
      • ISO 27017 – Cloud Security for CSP’s
      • ISO 27018 – Data Privacy for CSP’s
      • ISO 27701 – Data Privacy Management System
    • SOC 2 Readiness
    • Virtual CISO (vCISO)
    • IoT Security
      • IoT Security Consulting & Assessments
    • Network Security
      • CREST Network Penetration Test
      • Vulnerability Assessment
      • Penetration Test
      • Architecture Review
    • Application Security
      • Penetration Test
      • API Penetration Testing
      • Architecture Review & Threat Assessment
    • Vendor Due Diligence
      • Accelerated Vendor Due Diligence
      • Third Party Risk Management
    • SaaS Security
    • Business Continuity
    • Blockchain Security
  • Compliance
    • CMMC
      • CMMC Compliance Services
      • DFARS Compliance
    • CCPA
    • SOC 2
    • CIS CSC
    • PCI
    • FedRAMP
    • NYDFS
    • GDPR
    • HIPAA
    • HITRUST
  • Industries
    • Legal
    • Financial
    • Government
    • Healthcare
    • More Industries
  • Resources
    • ISO 27001 Resources
      • ISO 27001 Audit & Cost Guide
      • ISO 27001 Checklist
      • ISO 27001 Cost Blog
      • ISO 27001 : Recipe & Ingredients for Certification
      • ISO 27001 Roadmap
      • ISO 27701 Cost
      • Gap Assessment Template
      • Risk Assessment Template
    • CCPA
      • CCPA Compliance Roadmap
    • CMMC
      • CMMC Certification Guide
      • CMMC C3PAO FAQs
      • CMMC Capabilities
      • CMMC Cost
      • CMMC Gap Analysis FAQs
      • CMMC Marketplace FAQs
      • SSP for CMMC
    • vCISO
      • vCISO Cost
    • FedRAMP
      • FedRAMP Cost
    • Third Party Risk Management
      • VRM Best Practice Guide for Small to Medium Businesses
    • Application Security
      • Ready for a Pen Test? Infographic
    • Business Continuity
      • BCP Table Top Exercise Template
  • About Us
    • Locations
    • Client Satisfaction
    • Giving Back
    • Jobs
    • Working at Pivot Point Security
    • PPS Partners
    • Our Stance on Inclusivity
    • The Virtual CISO Podcast
  • Blog
  • Contact Us
  • 1-888-PIVOT-POINT
    1-888-748-6876
  • info@pivotpointsecurity.com
  • 1-888-PIVOT-POINT | 1-888-748-6876
  • info@pivotpointsecurity.com
Pivot Point Security
PPS ISO 27001 Logo RPO Logo
  • Services
    • CMMC Preparation
      • CMMC Compliance Services
    • ISO 27001
      • ISO 27001 Certification
      • ISO 27001 Maintenance
      • ISO 27017 – Cloud Security for CSP’s
      • ISO 27018 – Data Privacy for CSP’s
      • ISO 27701 – Data Privacy Management System
    • SOC 2 Readiness
    • Virtual CISO (vCISO)
    • IoT Security
      • IoT Security Consulting & Assessments
    • Network Security
      • CREST Network Penetration Test
      • Vulnerability Assessment
      • Penetration Test
      • Architecture Review
    • Application Security
      • Penetration Test
      • API Penetration Testing
      • Architecture Review & Threat Assessment
    • Vendor Due Diligence
      • Accelerated Vendor Due Diligence
      • Third Party Risk Management
    • SaaS Security
    • Business Continuity
    • Blockchain Security
  • Compliance
    • CMMC
      • CMMC Compliance Services
      • DFARS Compliance
    • CCPA
    • SOC 2
    • CIS CSC
    • PCI
    • FedRAMP
    • NYDFS
    • GDPR
    • HIPAA
    • HITRUST
  • Industries
    • Legal
    • Financial
    • Government
    • Healthcare
    • More Industries
  • Resources
    • ISO 27001
      • ISO 27001 Audit & Cost Guide
      • ISO 27001 Checklist
      • ISO 27001 Cost Blog
      • ISO 27001: Recipe & Ingredients for Certification
      • ISO 27001 Roadmap
      • ISO 27701 Cost
      • Gap Assessment Template
      • Risk Assessment Template
    • CCPA
      • CCPA Compliance Roadmap
    • CMMC
      • CMMC Certification Guide
      • CMMC C3PAO FAQs
      • CMMC Capabilities
      • CMMC Cost
      • CMMC Gap Analysis FAQs
      • SSP for CMMC
      • CMMC Marketplace FAQs
    • vCISO
      • vCISO Cost
    • FedRAMP
      • FedRAMP Cost
    • Third Party Risk Management
      • VRM Best Practice Guide for Small to Medium Businesses
    • Application Security
      • Ready for a Pen Test? Infographic
    • Business Continuity
      • BCP Table Top Exercise Template
  • About Us
    • Locations
    • Client Satisfaction
    • Giving Back
    • Jobs
    • Working at Pivot Point Security
    • PPS Partners
    • Inclusivity: Our Stance & Actions
    • The Virtual CISO Podcast
  • Blog
  • Contact Us
Access The Latest Episodes from The Virtual CISO Podcast

Business Continuity Is Fundamentally About Resilience

by John Verry | May 12, 2020 | Business Continuity Management, Disaster Recovery, InfoSec Strategies

Reading Time: 4 minutes Getting a flat tire is a disaster. Knowing where you keep the spare is disaster recovery. Changing a tire in under 7 minutes to get right back on the road is business continuity. On a recent episode of Virtual CISO, I got a chance to...

5 Top Information Security Accreditations for SaaS Providers

by Jeremy Sporn | Jun 3, 2019 | Business Continuity Management, Disaster Recovery, InfoSec Risk Assessment, InfoSec Strategies, ISMS Consulting, ISO 22301

Reading Time: 4 minutes The SaaS model depends on trust. As a SaaS provider, are potential customers confident they can trust you with their data? Despite massive and growing investments in cloud applications and services, a McAfee study on the state of...

To Pay or Not to Pay Your Hackers? Why There’s Really No Debate on Ransomware Response

by Taylor Smith | Dec 27, 2018 | Disaster Recovery

Reading Time: 2 minutes There’s no such thing as being “100% safe” from ransomware. That’s why every organization needs safe, timely, reliable backups as part of an overall data recovery plan. If you can contain a ransomware infection and restore your data...

Recovery Time Objectives (RTOs) & Your Disaster Recovery Plan

by Bob Cohen | Dec 4, 2018 | Disaster Recovery

Reading Time: 2 minutes Recovery Time Objectives (RTOs) are the essential starting point for determining your disaster recovery strategy.  Why?  Because you need to know which functions are most critical and how long others can be deferred, so you can make...

Recovery Planning Neglect – Excuses That Make a BC/DR Professional’s Head Spin 

by Bob Cohen | Aug 28, 2018 | Disaster Recovery

Reading Time: 3 minutes Quick disclaimer: We really care about our client’s security.  Because of this, my blood has been known to boil when we hear “excuses” or rationalizations as reasons for making poor information security decisions. When it comes...

Disaster Recovery Planning for Hurricane Season

by Bob Cohen | Jul 5, 2018 | Disaster Recovery

Reading Time: 3 minutes June 1 marks the start of hurricane season in the western Atlantic. As the climate warms, the oceans warm which gives hurricanes more energy.  They are becoming more frequent, more powerful and more destructive. If you work in, or...
« Older Entries
RSS RSS Feed

Free Downloads

  • ISO 27001 Roadmap
  • ISO 27001 Cost Guide
  • vCISO Roadmap
  • View All »

Filter Articles By Tags

Application application security testing ASVS business continuity planning CCPA CMMC compliance cyber attacks cybersecurity Data Breach data privacy Disaster Recovery disaster recovery plan Financial GDPR hackers information security information security risk infosec ISMS ISO 27001 ISO 27001 audit ISO 27002 Law Legal municipal government NIST OWASP OWASP ASVS Passwords Penetration Test Phishing regulation Risk Assessment Risk Management SCA security awareness education security awareness training SIEM SOC 2 Social Engineering The Virtual CISO Podcast tprm vCISO Vendor Risk Management

Blog Categories

  • ISO 27001 Certification
  • ISMS Consulting
  • InfoSec Risk Assessment
  • Penetration Testing
  • Ethical Hacking
  • Business Continuity Management
  • FedRamp
  • Disaster Recovery

About Us

Pivot Point Security has been architected to provide maximum levels of independent and objective information security expertise to our varied client base.

Free Resources »

Recent Blog Posts:

  • Can There Ever Be “Just One” Cybersecurity Standard?
  • The 2 Types of Organizations that Fail Information Security: Which One Are You?
  • The Not-So-Great State of Third-Party Risk Management
  • The SolarWinds Breach and CMMC – What’s the Impact?
white ISO 27001 logo RPO Logo
  • Home
  • Blog
  • About Pivot Point Security
  • The Virtual CISO Podcast

© 2001 - 2021 Pivot Point Security Privacy Policy | Cookie Policy | External Linking Policy | Sitemap