Our Thoughts On

Sort by

Categories
Authors

IT Risk Advisory

Articles 21 - 30 of 39

How To Scope a SOC 2 Audit

How do you properly scope your SOC 2 audit? Find out in Troy Fine's latest article.

Do I Need a SOC 2 Type 1 Before a SOC 2 Type 2?

Schneider Downs' Troy Fine discusses if you need to perform a SOC 2 Type 1 audit before a SOC 2 Type 2 audit.

Why Do CPA Firms Perform SOC 2 Audits?

Learn why CPA firms perform SOC 2 audits and factors to consider when searching for a SOC 2 partner.
Schneider Downs' Troy Fine breaks down some of the common misconceptions about SOC 2 audits.
Register to receive our weekly newsletter with our most recent columns and insights.

Getting Started with SOC 2 Reports

Learn about best practices for getting started with SOC 2 Reports from our team of professionals.

SOC 2 – The Importance of Leadership Buy-In

Learn why leadership buy-in is crucial for successful SOC 2 audits.

What’s the Difference Between SOC 1 and SOC 2 Reports?

Learn about the differences and similarities between SOC 1 and SOC 2 reports.

Employee Benefits Security Administration Cybersecurity Guidance

Learn more about the three tips plan sponsors, fiduciaries and participants should take in protecting their data from cybercrime this ERISA season.
Register to receive our weekly newsletter with our most recent columns and insights.

Time Again for Cyburgh – and Additional Cyber Resources

Preview the new cybersecurity resources from Schneider Downs ahead of the 2021 Cyburgh Initiative.

Guidance for NERC-CIP-013-01 Compliance

Learn about best practices and guidance for NERC-CIP-013-01 Compliance.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×