Watch this on-demand webinar as Allison and Charlie take a deeper dive as SOC 2 compliance is becoming a necessity as companies leverage the cloud to store customer data. During our presentation, we will discuss the history of SOC2 reporting and convey the differences between a SOC1 and SOC2.
You will learn:
-
Type 1 versus the Type 2 report and why one is significantly more valuable than the other
-
Benefits, common pitfalls and misconceptions associated with the SOC2 report
-
Which organizations would benefit the most from a SOC2 report
The Speakers
Charlie Wood is an Executive Vice President in the FoxPointe Solutions Information Risk Management Division of The Bonadio Group. He has over 21 years of experience in the information technology industry, with a focus on security hardening, data privacy, vulnerability identification and remediation, internal and external auditing, control optimization and compliance, system administration, disaster recovery, and business continuity and impact analysis, as well as general project management.
Prior to joining Bonadio, Charlie worked in the Systems Performance Assurance group at a Big 4 firm, where he obtained extensive enterprise risk management experience with respect to IT security reviews in support of critical business processes for clients in a variety of industries. Charlie identified critical business processes and specific IT threats and recommended controls to mitigate those threats to ensure that clients maintained stable and efficient computing/business environments.
Allison Hall is a Managing Consultant in the FoxPointe Solutions Information Risk Management Division of The Bonadio Group. Allison has a focus on internal and external auditing of information technology and information security practices and controls. Her experience includes auditing and consulting for organizations across all lines of service where she executes programs predicated upon ensuring that client computer controls are functioning. Allison has co-authored an article for Bonadio Insights pertaining to the New York Data Security Act. She is a member of the Information Systems Audit and Control Association (ISACA) and the Health Information Trust Alliance (HITRUST).