In 1999, the GLBA, also known as the Financial Services Modernization Act of 1999.
A System and Organization Controls for Service Organizations 2 (SOC 2) Type 2 audit is a technical audit.
A vulnerability scanner scans a network or systems, including operating systems, for known weaknesses.
Pipeline Security Guidelines is a set of voluntary guidelines for pipeline operators.
Audit evidence is important because it is all the information that an auditor gathers to reach his audit opinion.
The SSAE 18 auditing standards require that service organizations.
The focus of an ISO surveillance audit is to ensure an organization is continuing to comply with ISO standards.
Key Performance Indicators (KPI) are how organizations measure success.
The NIST a non-regulatory government agency that belongs to the U.S. Department of Commerce.
The Vendor Security Alliance (VSA), a coalition of companies committed to improving Internet security.
Third-party vendor management consists of all the processes necessary for a company.
Privileged access management (PAM) encompasses the cybersecurity strategies and technologies.