www.ostendio.com Open in urlscan Pro
2606:2c40::c73c:67e2  Public Scan

Submitted URL: https://cfjm804.na1.hubspotlinks.com/Ctc/DL+113/cFJm804/VVp6yP8v1GTZW5J3xHH5wQ29zW8fXtNV4RncqZN52hRhc3q905V1-WJV7CgTTWW3jg1hf6fhCTKW4...
Effective URL: https://www.ostendio.com/blog?utm_campaign=HITRUST%20Nurture%202021&utm_medium=email&_hsmi=226985959&_hsenc=p2ANqtz-9BX0t...
Submission: On October 21 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Platform
   * Platform Overview
   * Platform Integrations
   * Professional Services
 * Knowledge
   * Resources
   * Blog
   * Client Case Studies
 * Pricing
 * Partners
   * Our Partners
   * Partner With Ostendio
 * About Us
   * About Ostendio
   * News & Awards
   
   

 * Platform
   * Platform
   * Platform Overview
   * Platform Integrations
   * Professional Services
 * Knowledge
   * Knowledge
   * Resources
   * Blog
   * Client Case Studies
 * Pricing
 * Partners
   * Partners
   * Our Partners
   * Partner With Ostendio
 * About Us
   * About Us
   * About Ostendio
   * News & Awards
   
   

Login
Schedule a Demo


Cybersecurity,
HITRUST,
Integrated Risk Management,
Risk Management & Compliance,
audit,
security audit


ARE YOU READY FOR HITRUST?

by Ostendio
on October 14, 2022

[4 min read] Among the myriad of challenges facing the modern CISO lies the
consistent need to improve data security by selecting the security framework
that aligns best with your industry and ...

Read More
September 13, 2022



EVOLVING THE OSTENDIO BRAND IDENTITY

[3 min read] Our industry has evolved.  With more than 80% of security breaches
caused by human error,  traditional GRC tools are no longer enough for today’s
modern, complex business environments.

By Ostendio
August 23, 2022



HOW TO RUN A SUCCESSFUL BUSINESS CONTINUITY TABLETOP EXERCISE

[4 min read] Advice from an experienced facilitator of Incident Response and
Business Continuity Tabletop Exercises Companies of all sizes, in many
industries, have a common challenge - cybersecurity and how to protect their
sensitive data. Organizations that store PII (Personally Identifiable ...

By Ostendio
August 10, 2022



HOW TO BUILD AN INCIDENT RESPONSE TEAM IN 2022

[4 min read] Updated for 2022 -  Includes 11 Tips for Building your Incident
Response Team As the rate of data breaches is on the rise it is no surprise that
more companies are building an incident response team so their organization can
act faster and more effectively when there is a cyber attack. ...

By Ostendio
August 02, 2022



FORBES: HOW TO NAVIGATE THE TOP RISK AND SECURITY TRENDS OF 2022

[3 min read] Forbes Q&A with Grant Elliott, co-founder, CEO, and Chairman of
Ostendio This is an excerpt from an article that appeared in Forbes on July
28th, 2022. You can read the full article here. Ostendio CEO, Grant Elliott, sat
down with a Forbes magazine reporter to discuss the Top Risks ...

By Ostendio
July 07, 2022



3 STEPS TO START YOUR THIRD-PARTY RISK MANAGEMENT PROGRAM

[4 min read] As supply chains become more complex, third-party and vendor data
breaches have increasingly become one of the most significant threats to an
organization’s security. So it comes as no surprise that Third-Party Risk
Management and Vendor Risk Management are top of mind for many busy ...


May 10, 2022



7 REASONS A TRADITIONAL GRC TOOL IS NOT ENOUGH

[5 min read] To the busy CISO, it might seem like implementing a GRC
(Governance, Risk and Compliance) tool will be an easy way to create and manage
a data security and risk management program. However, upon implementation, CISOs
soon realize that a traditional GRC tool is not enough for today’s ...


May 09, 2022



THE RISE AND FALL OF SOC 2 AUDITS

[5 min read] Is the AICPA asleep at the wheel? More and more tech companies are
seeking to demonstrate their security posture by undertaking a SOC 2 audit but,
with so many audits taking place, and so much market pressure to reduce the cost
and complexity of such audits, is the AICPA doing enough ...


April 25, 2022



3 VENDOR RISK MANAGEMENT CHALLENGES AND HOW TO SOLVE THEM

[5 min read] Vendor Risk management is a hot topic especially when you realize
that many of the most high-profile data breaches are due to vendors or
third-parties (think of the widespread impact of the Solar Winds attack).
Consider the financial impact alone when you realize that experts estimate ...


April 05, 2022



3 STEPS TO ESTABLISHING A VENDOR RISK MANAGEMENT PROGRAM

[4 min read] Why vendors may be the biggest security risk to your organization
Of the companies that experienced a data breach in 2021, over 90% of breaches
were linked to a third-party vendor. It is an all too familiar risk management
story as evidenced by the Okta breach being attributed to a ...


March 09, 2022



WHY THE LOCATION OF DATA IS CRITICAL TO DATA SECURITY AND RISK MANAGEMENT

[3 min read] It is amazing to think about how much data we all create these
days. With so many employees working remotely, and the rise in the number of
cloud-based services such as Google Cloud and iCloud, a recent report estimates
that data will grow from 64.2 zettabytes in 2020 to more than180 ...


February 23, 2022



WHO OWNS DATA?

[4 min read] Data ownership is a complicated topic, much more complicated than
most might think. We often talk about data security in possessive terms of “my
sensitive data”, “my health information” or “my Personal Identifiable
Information (PII)”, but what does ownership of that data actually ...


February 07, 2022



DO YOU KNOW WHERE YOUR DATA IS?

[5 min read] And who has access to it? When I talk to CEOs and security
professionals about data security, the one question that continually trips them
up is - do you know where your data is?  They tend to stumble over this question
because they initially focus on their production data locations, ...


January 19, 2022



THE EVOLVING LANDSCAPE OF INTEGRATED RISK MANAGEMENT

[5 min read] If you are involved with, or interested in, the data security world
then no doubt you have heard many definitions of integrated risk management
(IRM) and Governance, Risk, Compliance (GRC).  Should we simply be looking at
“GRC 3.0” as professed by Michael Rasmussen at Forrester, the ...


December 03, 2021



HOW TO PREPARE FOR A SOC 2 AUDIT

[4 min read] Security standards, reports, and certifications are becoming
essential for vendors and technology firms. Certifications, such as SOC 2, offer
a cost-efficient way of demonstrating effective risk management practices and
meeting regulatory compliance directives.

By Ostendio
November 17, 2021



UNDERSTANDING THE SCIENCE OF RISK MANAGEMENT

[4 min read] Risk management is not well understood. Often there is confusion
between risk management and risk assessment, and added to that confusion is how
to measure risk or evaluate risk.  After all, it is hard to measure something
that hasn’t happened yet or to predict when it might happen.  ...


1 2 3 4 5 Next Last

Copyright ©2022 Ostendio, Inc.
All rights reserved
Privacy Policy · Terms Of Use · Acceptable Use Policy

          

 * About Us
 * Careers
 * Contact Us
 * News and Awards
 * Trust Network


 * The GRC Guide
 * The SOC 2 Guide
 * SOC 2 Solution
 * The HITRUST Guide
 * Auditor Connect