AJ Suurhoff
Articles
Recent activity by AJ Suurhoff
-
Assets
Working with AssetsManaging your organization’s assets can be a difficult task, as almost anything associated with a company could be considered an asset. Every employee, computer and cell phone i...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Audits
The Audits feature has been refreshed to include a useful workflow for performing internal or 3rd party audits. ControlMap has always supported auditing by evidence request list but now you are als...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Working with Evidence
The Evidence tab is used to manage evidence and evidence requests that link to controls. Evidence can also be linked and created directly within a Control. An example of evidence that would link to...
- Updated
- 1 follower
- 0 comments
- -3 votes
-
Policies
Information Security policies are the bedrock of all cybersecurity Compliance Certifications, Audits, and Assessments. Without a central system for documenting these policies, maintaining mappings ...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Controls
Implementing and monitoring controls is essential for all present-day organizations, as cyber threats/attacks are at an all-time high. You can create, edit and manage your controls within ControlM...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Adding, Uploading and Importing Risks
Creating a Risk Register and regularly performing a risk assessment is an integral part of a cybersecurity compliance program. Starting from a pre-built set of risks or a risk library can be very h...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Frameworks
Frameworks are a set of best practice recommendations by organizations like the American Institute of Certified Public Accountants (AICPA) for SOC2, National Institute of Standards and Technology (...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Configuring Tenant Sign In Settings - Google, Microsoft, SAML 2.0 SSO
Overview ControlMap allows users to utilize SSOs (or Single Sign-On) to streamline the login process. SSO Configuration can be configured within each customer tenant as outlined below. Additionall...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Start to finish. A workflow for a cybersecurity compliance program
Common workflow Here is a commonly used workflow by our customers planning an auditable framework such as SOC 2 or ISO 27001 certification. The end-to-end workflow is usually built out in Control...
- Updated
- 2 followers
- 0 comments
- 0 votes
-
Integrating with Breach Secure Now
OverviewThe Breach Secure Now integration will enable automatically bringing over companies and people from Breach Secure Now into ControlMap and ingesting Security Awareness Training details while...
- Updated
- 1 follower
- 0 comments
- 1 vote