www.ostendio.com
Open in
urlscan Pro
2606:2c40::c73c:67e2
Public Scan
Submitted URL: https://cfjm804.na1.hubspotlinks.com/Ctc/DL+113/cFJm804/VVp6yP8v1GTZW5J3xHH5wQ29zW8fXtNV4RncqZN52hRhc3q905V1-WJV7CgTTWW3jg1hf6fhCTKW4...
Effective URL: https://www.ostendio.com/blog?utm_campaign=HITRUST%20Nurture%202021&utm_medium=email&_hsmi=226985959&_hsenc=p2ANqtz-9BX0t...
Submission: On October 21 via manual from US — Scanned from DE
Effective URL: https://www.ostendio.com/blog?utm_campaign=HITRUST%20Nurture%202021&utm_medium=email&_hsmi=226985959&_hsenc=p2ANqtz-9BX0t...
Submission: On October 21 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Platform * Platform Overview * Platform Integrations * Professional Services * Knowledge * Resources * Blog * Client Case Studies * Pricing * Partners * Our Partners * Partner With Ostendio * About Us * About Ostendio * News & Awards * Platform * Platform * Platform Overview * Platform Integrations * Professional Services * Knowledge * Knowledge * Resources * Blog * Client Case Studies * Pricing * Partners * Partners * Our Partners * Partner With Ostendio * About Us * About Us * About Ostendio * News & Awards Login Schedule a Demo Cybersecurity, HITRUST, Integrated Risk Management, Risk Management & Compliance, audit, security audit ARE YOU READY FOR HITRUST? by Ostendio on October 14, 2022 [4 min read] Among the myriad of challenges facing the modern CISO lies the consistent need to improve data security by selecting the security framework that aligns best with your industry and ... Read More September 13, 2022 EVOLVING THE OSTENDIO BRAND IDENTITY [3 min read] Our industry has evolved. With more than 80% of security breaches caused by human error, traditional GRC tools are no longer enough for today’s modern, complex business environments. By Ostendio August 23, 2022 HOW TO RUN A SUCCESSFUL BUSINESS CONTINUITY TABLETOP EXERCISE [4 min read] Advice from an experienced facilitator of Incident Response and Business Continuity Tabletop Exercises Companies of all sizes, in many industries, have a common challenge - cybersecurity and how to protect their sensitive data. Organizations that store PII (Personally Identifiable ... By Ostendio August 10, 2022 HOW TO BUILD AN INCIDENT RESPONSE TEAM IN 2022 [4 min read] Updated for 2022 - Includes 11 Tips for Building your Incident Response Team As the rate of data breaches is on the rise it is no surprise that more companies are building an incident response team so their organization can act faster and more effectively when there is a cyber attack. ... By Ostendio August 02, 2022 FORBES: HOW TO NAVIGATE THE TOP RISK AND SECURITY TRENDS OF 2022 [3 min read] Forbes Q&A with Grant Elliott, co-founder, CEO, and Chairman of Ostendio This is an excerpt from an article that appeared in Forbes on July 28th, 2022. You can read the full article here. Ostendio CEO, Grant Elliott, sat down with a Forbes magazine reporter to discuss the Top Risks ... By Ostendio July 07, 2022 3 STEPS TO START YOUR THIRD-PARTY RISK MANAGEMENT PROGRAM [4 min read] As supply chains become more complex, third-party and vendor data breaches have increasingly become one of the most significant threats to an organization’s security. So it comes as no surprise that Third-Party Risk Management and Vendor Risk Management are top of mind for many busy ... May 10, 2022 7 REASONS A TRADITIONAL GRC TOOL IS NOT ENOUGH [5 min read] To the busy CISO, it might seem like implementing a GRC (Governance, Risk and Compliance) tool will be an easy way to create and manage a data security and risk management program. However, upon implementation, CISOs soon realize that a traditional GRC tool is not enough for today’s ... May 09, 2022 THE RISE AND FALL OF SOC 2 AUDITS [5 min read] Is the AICPA asleep at the wheel? More and more tech companies are seeking to demonstrate their security posture by undertaking a SOC 2 audit but, with so many audits taking place, and so much market pressure to reduce the cost and complexity of such audits, is the AICPA doing enough ... April 25, 2022 3 VENDOR RISK MANAGEMENT CHALLENGES AND HOW TO SOLVE THEM [5 min read] Vendor Risk management is a hot topic especially when you realize that many of the most high-profile data breaches are due to vendors or third-parties (think of the widespread impact of the Solar Winds attack). Consider the financial impact alone when you realize that experts estimate ... April 05, 2022 3 STEPS TO ESTABLISHING A VENDOR RISK MANAGEMENT PROGRAM [4 min read] Why vendors may be the biggest security risk to your organization Of the companies that experienced a data breach in 2021, over 90% of breaches were linked to a third-party vendor. It is an all too familiar risk management story as evidenced by the Okta breach being attributed to a ... March 09, 2022 WHY THE LOCATION OF DATA IS CRITICAL TO DATA SECURITY AND RISK MANAGEMENT [3 min read] It is amazing to think about how much data we all create these days. With so many employees working remotely, and the rise in the number of cloud-based services such as Google Cloud and iCloud, a recent report estimates that data will grow from 64.2 zettabytes in 2020 to more than180 ... February 23, 2022 WHO OWNS DATA? [4 min read] Data ownership is a complicated topic, much more complicated than most might think. We often talk about data security in possessive terms of “my sensitive data”, “my health information” or “my Personal Identifiable Information (PII)”, but what does ownership of that data actually ... February 07, 2022 DO YOU KNOW WHERE YOUR DATA IS? [5 min read] And who has access to it? When I talk to CEOs and security professionals about data security, the one question that continually trips them up is - do you know where your data is? They tend to stumble over this question because they initially focus on their production data locations, ... January 19, 2022 THE EVOLVING LANDSCAPE OF INTEGRATED RISK MANAGEMENT [5 min read] If you are involved with, or interested in, the data security world then no doubt you have heard many definitions of integrated risk management (IRM) and Governance, Risk, Compliance (GRC). Should we simply be looking at “GRC 3.0” as professed by Michael Rasmussen at Forrester, the ... December 03, 2021 HOW TO PREPARE FOR A SOC 2 AUDIT [4 min read] Security standards, reports, and certifications are becoming essential for vendors and technology firms. Certifications, such as SOC 2, offer a cost-efficient way of demonstrating effective risk management practices and meeting regulatory compliance directives. By Ostendio November 17, 2021 UNDERSTANDING THE SCIENCE OF RISK MANAGEMENT [4 min read] Risk management is not well understood. Often there is confusion between risk management and risk assessment, and added to that confusion is how to measure risk or evaluate risk. After all, it is hard to measure something that hasn’t happened yet or to predict when it might happen. ... 1 2 3 4 5 Next Last Copyright ©2022 Ostendio, Inc. All rights reserved Privacy Policy · Terms Of Use · Acceptable Use Policy * About Us * Careers * Contact Us * News and Awards * Trust Network * The GRC Guide * The SOC 2 Guide * SOC 2 Solution * The HITRUST Guide * Auditor Connect