HITRUST vs SOC 2: How to Choose

A HITRUST certification or a SOC 2 report, what’s best for your organization? At CompliancePoint, we’ve worked with many organizations…

Read More

Comparing FedRAMP and StateRAMP

For Cloud Service Providers (CSP) hoping to win business with federal, state, and local government entities, their product(s) will likely…

Read More

NIST CSF 2.0 Draft Released

The widely used NIST Cybersecurity Framework (CSF) is getting its first major upgrade in nearly a decade. Following more than…

Read More

The Keys to an Effective SOC 2 Readiness Assessment

A SOC 2 readiness assessment is a key step on the journey to achieving SOC 2 compliance. Think of the…

Read More
FedRAMP Rev. 5 servers

FedRAMP Rev. 5 Released

The Federal Risk and Authorization Management Program (FedRAMP) helps government agencies protect federal information while utilizing the power of cloud…

Read More

10 Steps to Prepare for PCI DSS v4.0

If you’re with an organization that is currently PCI-certified, or planning to get certified for the first time, chances are…

Read More

An Early Look at CMMC 2.0

The Cybersecurity Maturity Model Certification (CMMC) is a standard developed by the Department of Defense (DoD) to protect information in…

Read More

Making the Transition to ISO 27001: 2022

In late 2022, the ISO 27001: 2022 standard was published, marking the first update to the highly regarded international security…

Read More
GLBA cybersecurity requirements

GLBA Cybersecurity Requirements: What Your Organization Needs to Do

On June 9, 2023, new Gramm-Leach-Bliley Act (GLBA) cybersecurity requirements that reflect updates to the Safeguards Rule component of the…

Read More

Maintaining SOC 2 After Your Initial Report

A successful SOC 2 attestation is an accomplishment for any organization. You likely spent countless hours designing controls, implementing and…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.