Compliance

What is a SOC 2 Report?

What is a SOC 2 Report?

In a world filled with data breaches and information leaks, establishing trust is not only critical to driving revenue, it can also be a competitive differentiator for new business. A SOC 2 report helps demonstrate to customers and business partners that you take information security seriously. 

Read More

4 Miscellaneous HITRUST Regulatory Factors to Consider

4 Miscellaneous HITRUST Regulatory Factors to Consider

Over the last few blogs, we have provided a comprehensive overview of the HITRUST landscape, from the authoritative sources at its core, to the optional regulations, or regulatory factors, that are commonly added on to a HITRUST assessment for industry-specific purposes.  

Read More

5 HITRUST Regulatory Factors to Consider for International and State-level Privacy Compliance

WS HITRUST Blog Series

There are more than 20 optional regulatory factors that an organization can consider as part of a HITRUST assessment. These are individual options, based on specific industry requirements, and can be quite tricky to parse.  

Read More

How European Companies Can Accelerate International Expansion with SOC 2 Compliance

WS EMEA Accelerate Expansion SOC2

The United States represents an attractive market for many European companies, but international expansion can be fraught with risk because of a completely different regulatory landscape. 

Read More

7 HITRUST Factors to Consider for Federal Compliance

WS_HITRUST-Blog-Series

Our discussion of HITRUST regulatory factors continues with a focus on federal compliance and their influence on HITRUST. Here are 7 HITRUST regulatory factors to consider for federal compliance, and our recommendations on how to address them. 

Read More

NIST 800-53 Rev. 5 Adopts a Strategic Compliance Approach, Puts Privacy at a Premium

NIST 800-53 Rev. 5 Adopts a Strategic Compliance Approach, Puts Privacy at a Premium

The National Institute of Standards and Technology’s (NIST) latest version of Special Publication 800-53 places an enhanced focus on privacy controls and supply chain risk management.

Read More

Ace Your SOC Report with a SOC Audit Checklist

WS_SOC-Audit-Prep-Guide

For many organizations, obtaining a System and Organization Controls (SOC) attestation report is table stakes for doing business.

Read More

7 HITRUST Regulatory Factors to Consider for Healthcare

7 HITRUST Regulatory Factors to Consider for Healthcare

This article is Part One of a Four-part Series on the HITRUST Framework When you think of HITRUST, you probably think of healthcare. After all, HITRUST was originally created as the “Health Information Trust Alliance.”

Read More

Mind the Gap: How to Change Auditors without Impacting Compliance

Mind the Gap: How to Change Auditors without Impacting Compliance

Increasingly, organizations are realizing that a strategic compliance program increases operational efficiencies by replacing ad hoc and transactional audits with a more thoughtful approach. And as organizations get more serious about strategic compliance, they realize consolidation is a key component.

Read More

SOC Report Types: What You Need to Know

SOC Report Types: What You Need to Know

Organizations cannot afford to leave their clients’ trust to chance. They face complex pressures from customers, regulators and cyberattacks to implement appropriate controls within their environments to protect customer and proprietary data.

Read More