cognitive cybersecurity intelligence

News and Analysis

Search

How To Vet a Provider’s Cybersecurity Processes

Audits of third-party providers conducted under the Service Organization Control Type 2 (SOC 2) framework are a key tool for firms to verify the cybersecurity systems of vendors and providers, according to a panel at CIO’s recent livestream event. Such audits can reveal the effectiveness of a company’s internal controls and show how well it protects customer data. The panel also stressed that cybersecurity insurance is crucial, but complex, and thus requires advice from knowledgeable brokers.

Source: www.ai-cio.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Connecting Tech to Black America

Tech evangelist David Lee spotlights the underrepresentation of Black Americans in tech, an issue he contends requires collective action to rectify. He suggests fostering connections

Zero-Day Attack Hits Cybersecurity Leader

The MITRE Corporation, a contributor to public interest cybersecurity, disclosed a data breach originating from a state-backed hack. Detected after suspicous activity was noticed on

Defining and Understanding Trust Assurance

Trust is essential for businesses and building it requires embracing the pillars of trust assurance: predictive, integrated, and transparent systems. Through trust assurance, businesses can