28 Jun Business Continuity Management, Third Party Risk Management Shadow IT’s Impact on Security, Business Continuity and Vendor Risk Management June 28, 2016 By John Verry Shadow IT refers to any technology that is used in a company without the oversight of the IT department. The scope of Shadow IT is com... Continue reading
23 Jun ISO 27001 Certification | Category - Pivot Point Security The Rising Cost of ISO 27001 Certification January 15, 2024 By John Verry As ISO 27001 and related attestation standards have grown in importance and popularity, so too has the cost of becoming ISO 27001 certi... Continue reading
13 May Cybersecurity | Category - Pivot Point Security, ISO 27001 Certification | Category - Pivot Point Security Tips for FinTech Companies—and How ISO 27001 Can Help (Part 3 of 3) January 18, 2024 By Richard Barrus As an ISO 27001 Certified Lead Implementer living in Atlanta, GA, I hear a lot of people talking about Financial Technology (FinTech) c... Continue reading
12 Apr ISO 27001 Certification | Category - Pivot Point Security Standards, Policies and Procedures—Three Reasons Why They’re Essential for Every Business January 12, 2024 By Richard Barrus I often come across clients with little documentation supporting internal standards, policies and/or procedures. Or, if the documentati... Continue reading
22 Mar Cybersecurity | Category - Pivot Point Security, ISO 27001 Certification | Category - Pivot Point Security Top Cybersecurity Tips for FinTech Companies—and How ISO 27001 Can Help (Part 1 of 3) January 13, 2024 By Richard Barrus As an ISO 27001 Certified Lead Implementer living in Atlanta, GA, I hear a lot of people talking about Financial Technology (FinTech) c... Continue reading