Your browser does not support the video tag.
Pivot Point Security
  • Services

    CMMC Preparation

    ISO 27001

    SOC 2 Readiness

    Virtual CISO (vCISO)

    IoT Security

    Network Security

    Application Security

    Vendor Due Diligence

    SaaS Security

    Busi n ess C ontinui t y

    Business Continuity

    Blockchain Security

    SCA

  • Compliance

    CMMC

    NIST SP 800-218

    CCPA

    SOC 2

    CIS C SC

    CIS CSC

    PCI

    FedRAMP

    GLBA

    NYDFS

    GDPR

    HIPAA

    HITRUST

    TISAX

  • Insights

    Podcasts

    Resources

    Blog

  • About Pivot Point Security

    About Us

    Leadership

    Jobs

    Locations

    Partner With Us

Contact Us
pivotpoint logo.png
Menu

Disaster Recovery

12 May
Business Continuity Management, Disaster Recovery, InfoSec Strategies

Business Continuity Is Fundamentally About Resilience

  • May 12, 2020
  • By author-avatar John Verry
  • 0 comments
Getting a flat tire is a disaster. Knowing where you keep the spare is disaster recovery. Changing a tire in under 7 minutes to get rig...

Continue reading

03 Jun
Business Continuity Management, Disaster Recovery, InfoSec Risk Assessment, InfoSec Strategies, ISMS Consulting, ISO 22301

5 Top Information Security Accreditations for SaaS Providers

  • June 3, 2019
  • By author-avatar Richard Barrus
  • 7 comments
The SaaS model depends on trust. As a SaaS provider, are potential customers confident they can trust you with their data? Despite mas...

Continue reading

27 Dec
Disaster Recovery

To Pay or Not to Pay Your Hackers? Why There’s Really No Debate on Ransomware Response

  • December 27, 2018
  • By author-avatar Taylor Smith
  • 0 comments
There’s no such thing as being “100% safe” from ransomware. That’s why every organization needs safe, timely, reliable backups as part ...

Continue reading

04 Dec
Disaster Recovery

Recovery Time Objectives (RTOs) & Your Disaster Recovery Plan

  • December 4, 2018
  • By author-avatar Richard Barrus
  • 0 comments
Recovery Time Objectives (RTOs) are the essential starting point for determining your disaster recovery strategy.  Why?  Because you ne...

Continue reading

28 Aug
Disaster Recovery

Recovery Planning Neglect – Excuses That Make a BC/DR Professional’s Head Spin 

  • August 28, 2018
  • By author-avatar Richard Barrus
  • 0 comments
Quick disclaimer: We really care about our client’s security.  Because of this, my blood has been known to boil when we hear “excuses” ...

Continue reading

  • 1
  • 2
  • 3
  • 4
footerPerson 1

How can we help you?

Have a question? Click the button below to contact us. We will reply as soon as possible.
Contact Us
PPS Logo Color 1 min
ISO 27001 certification Icon WHITE 1 min
CMMC Compliance RPO Logo
ErPsTawi


    Copyright 2022 Pivot Point Security. All Rights Reserved.

    Privacy Policy | Cookie Policy | External Linking Policy | Sitemap

    • Services
      • CMMC Preparation
        • CMMC Compliance Services
        • Cloud Controls Matrix
      • ISO 27001
        • ISO 27001 Certification
        • ISO 27001 Maintenance
        • ISO 27017 – Cloud Security for CSP’s
        • ISO 27018 – Data Privacy for CSP’s
        • ISO 27701 – Data Privacy Management System
      • SOC 2 Readiness
      • Virtual CISO (vCISO)
      • IoT Security
        • IoT Security Consulting & Assessments
      • Network Security
        • CREST Network Penetration Test
        • Vulnerability Assessment
        • Penetration Test
        • Architecture Review
      • Application Security
        • Penetration Test
        • API Penetration Testing
        • Architecture Review & Threat Assessment
      • Vendor Due Diligence
        • Accelerated Vendor Due Diligence
        • Third Party Risk Management
      • SaaS Security
      • Business Continuity
      • Blockchain Security
      • SCA
    • Compliance
      • CMMC
        • CMMC Compliance Services
        • DFARS Compliance
      • CCPA
      • SOC 2
      • CIS CSC
      • PCI
      • FedRAMP
      • NYDFS
      • GDPR
      • HIPAA
      • HITRUST
      • TISAX
    • Industries
      • Legal
      • Financial
      • Government
      • Healthcare
      • More Industries
    • Resources
      • ISO 27001 Resources
        • ISO 27001 Audit & Cost Guide
        • ISO 27001 Checklist
        • ISO 27001 Cost Blog
        • ISO 27001 : Recipe & Ingredients for Certification
        • ISO 27001 Roadmap
        • ISO 27701 Cost
        • Gap Assessment Template
        • Risk Assessment Template
      • CCPA
        • CCPA Compliance Roadmap
      • CMMC
        • CMMC Assessment Checklist
        • CMMC Certification Guide
        • CMMC C3PAO FAQs
        • CMMC Capabilities
        • CMMC Cost
        • CMMC Gap Analysis FAQs
        • SSP for CMMC
        • CMMC Marketplace FAQs
      • vCISO
        • vCISO Cost
      • FedRAMP
        • FedRAMP Cost
      • Third Party Risk Management
        • VRM Best Practice Guide for Small to Medium Businesses
      • Application Security
        • Ready for a Pen Test? Infographic
      • Business Continuity
        • BCP Table Top Exercise Template
    • Insights
      • Podcasts
      • Resources
      • Blog
    • About Us
      • Locations
      • Client Satisfaction
      • Giving Back
      • Jobs
      • Working at Pivot Point Security
      • PPS Partners
    • Blog
    • Contact Us