User

AJ Suurhoff

Member since
Total activity 159
Last activity
Following 0 users
Followed by 0 users
Votes 0
Subscriptions 84

Articles

Recent activity by AJ Suurhoff

  • Assets

    Working with AssetsManaging your organization’s assets can be a difficult task, as almost anything associated with a company could be considered an asset.  Every employee, computer and cell phone i...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Audits

    The Audits feature has been refreshed to include a useful workflow for performing internal or 3rd party audits. ControlMap has always supported auditing by evidence request list but now you are als...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Working with Evidence

    The Evidence tab is used to manage evidence and evidence requests that link to controls. Evidence can also be linked and created directly within a Control. An example of evidence that would link to...

    • Updated
    • 1 follower
    • 0 comments
    • -3 votes
  • Policies

    Information Security policies are the bedrock of all cybersecurity Compliance Certifications, Audits, and Assessments. Without a central system for documenting these policies, maintaining mappings ...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Controls

    Implementing and monitoring controls is essential for all present-day organizations, as cyber threats/attacks are at an all-time high.  You can create, edit and manage your controls within ControlM...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Adding, Uploading and Importing Risks

    Creating a Risk Register and regularly performing a risk assessment is an integral part of a cybersecurity compliance program. Starting from a pre-built set of risks or a risk library can be very h...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Frameworks

    Frameworks are a set of best practice recommendations by organizations like the American Institute of Certified Public Accountants (AICPA) for SOC2, National Institute of Standards and Technology (...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Configuring Tenant Sign In Settings - Google, Microsoft, SAML 2.0 SSO

    Overview ControlMap allows users to utilize SSOs (or Single Sign-On) to streamline the login process.  SSO Configuration can be configured within each customer tenant as outlined below. Additionall...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Start to finish. A workflow for a cybersecurity compliance program

    Common workflow   Here is a commonly used workflow by our customers planning an auditable framework such as SOC 2 or ISO 27001 certification. The end-to-end workflow is usually built out in Control...

    • Updated
    • 2 followers
    • 0 comments
    • 0 votes
  • Integrating with Breach Secure Now

    OverviewThe Breach Secure Now integration will enable automatically bringing over companies and people from Breach Secure Now into ControlMap and ingesting Security Awareness Training details while...

    • Updated
    • 1 follower
    • 0 comments
    • 1 vote