SOC 2 Bridge Letter Explained + Gap Letter Example
I.S. Partners Blog
by Howard Poston
3w ago
What is a Bridge/Gap Letter for SOC 2 Audits? A SOC 2 bridge letter — called a “gap letter” — is a document that helps close the gap between an organization’s last SOC 2 report and the current date. The provider writes gap letters and outlines any changes in its systems, security controls, and internal ..read more
Visit website
PICPA Peer Review Committee’s Positive Reviews on I.S. Partners
I.S. Partners Blog
by John DeCesare
2M ago
Every CPA firm undergoes a comprehensive external review for quality control of audit processes conducted by leading industry experts. One of the most well-known peer-review committees for CPA firms is the Pennsylvania Institute of Certified Public Accountants (PICPA) Peer Review Committee. Our firm is proud to announce that we have received a positive peer review ..read more
Visit website
Now in Effect: SEC Cybersecurity Disclosure Rule
I.S. Partners Blog
by Jena Andrews
2M ago
The Securities and Exchange Commission (SEC) recently adopted new rules requiring public companies to disclose material cybersecurity incidents within four business days and provide annual and immediate disclosure on cybersecurity risk management. The rules aim to give investors timely, consistent, and comparable information to evaluate cybersecurity threats and maintain public safety. As you review the ..read more
Visit website
Ultimate Guide to SOC 1 Compliance
I.S. Partners Blog
by Anthony Jones
5M ago
Navigate the complexities of SOC 1 Compliance with this informative guide. Learn about the requirements, audit process, costs, and expert services ..read more
Visit website
Comprehensive Guide to SOC 2 Controls List
I.S. Partners Blog
by Anthony Jones
5M ago
Understand the intricacies of SOC 2 controls and their critical importance in safeguarding customer data. See the detailed controls list with examples ..read more
Visit website
SOC 1 vs SOC 2 vs SOC 3: Essential SOC Report Overview
I.S. Partners Blog
by Bernard Gallagher
6M ago
Explore the key differences between SOC 1, SOC 2, and SOC 3 reports. Understand which one is best suited for your organization ..read more
Visit website
9 Steps to Prepare for a SOC 2 Audit | SOC 2 Compliance Checklist
I.S. Partners Blog
by Anthony Jones
6M ago
Explore 9 steps to prepare for a SOC 2 audit and download a compliance checklist for efficient audit processes. Discover how I.S. Partners can assist you ..read more
Visit website
ISO 27001 vs. SOC 2: Which is Right for your Company?
I.S. Partners Blog
by David Dunkelberger
6M ago
As business networks continue to grow, the need for more outstanding network support often puts a lot of strain on an organization’s resources. This has led many companies to outsource certain aspects of their IT. While this has led to greater organizational efficiency, it has also raised concerns about the security of those systems.  While … ISO 27001 vs. SOC 2: Which is Right for your Company? Read More ..read more
Visit website
I.S. Partners Among Top 10 Cybersecurity Consultants in Philly Area 
I.S. Partners Blog
by John DeCesare
7M ago
This year, I.S. Partners was ranked #9 among the top 100 cybersecurity consulting companies in Philadelphia ..read more
Visit website
Full Disclosure: SOC 2 Type I vs SOC 2 Type II 
I.S. Partners Blog
by Mike Mariano
7M ago
SOC 2 Type I vs SOC 2 Type II ..read more
Visit website

Follow I.S. Partners Blog on FeedSpot

Continue with Google
Continue with Apple
OR