by John Verry | Jun 25, 2020 | ISO 27001 Certification
Reading Time: 3 minutes
No offense, but your ISMS Internal Audit approach/program probably sucks. How would I know? Because Pivot Point Security performs 100+ ISO 27001 ISMS Internal Audits each year for companies across different verticals. What makes them...
by Richard Stever | Nov 7, 2019 | InfoSec Strategies
Reading Time: 2 minutes
Recently I had a hypothetical conversation with our marketing director about “what if” a spokesperson or responsible party for a government agency, local municipality, regulated organization or business of any size stood up in public...
by Aurore Watts | Aug 28, 2019 | ISO 27001 Certification
Reading Time: 3 minutes
Recently we have been seeing a lot of interest among clients and prospective clients in working towards SOC 2 attestation and ISO 27001 certification at the same time. This isn’t unexpected given how much the new SOC 2 framework...
by Bob Cohen | Jul 24, 2019 | ISO 27001 Certification
Reading Time: 2 minutes
In the course of any successful ISO 27001 project, there comes a point where primary ownership and responsibility for the information security management system (ISMS) transfers from the advisor or consultant, that is helping with...
by Terry Crowley | Jun 24, 2019 | Penetration Testing
Reading Time: 2 minutes
Penetration testing seeks to evaluate your security posture using simulated attacks to identify and exploit vulnerabilities. Most pen testing is done by experts using manual techniques supported by automated tools. In any...