Hear straight from Scytale's Senior Compliance Success Manager, Wesley Van Zyl, as he walks us through the process with Scytale.
HOW SOC 2 SAVVY ARE YOU?
The most comprehensive masterclass for SOC 2 out there and the ONLY dedicated SOC 2 Master Implementer Certification in existence.
- What is SOC 2 compliance?
- AICPA COSO Framework
- Trust Service Criteria (‘TSC’) and Point of Focus
- Audit Timeline & period
- Certification bodies
- Defining the scope
- Creation of ‘System Description’
- Types of Controls
- Gap Analysis
- Identifying Gaps and Remediation
- Creation and Mapping of Controls
- Choosing the Auditing Firm
- Control Environment
- Risk Assessment
- Monitoring Activities
- Control Activities
- Logical and Physical Access Controls
- System Operations
- Change Management
- Risk Mitigation
- Additional Criteria for Availability
- Additional Criteria for Confidentiality
- Additional Criteria for Processing Integrity
- Additional Criteria for Privacy
- Shared Responsibility Model
- Key Stakeholder Identification
- Technical, Procedural, and Administrative Controls Implementation
- Policies and Procedures
- Passwords and MFA
- Risk Mitigation
- Risk Assessment
- User Access Review
- Security Awareness Training
- Security Risk Vs Security Vulnerabilities
- Endpoint Management and Anti-Malware
- Assets Mapping and Classification
- Human Resources
- Maintenance, Monitoring, and Analysis of Audit Logs
- Data Breaches and Disclosures
- Crisis Management
- Segregation of Duties and Least Privilege
- Change Management
- Internal Audit
- Audit Principles and Concepts
- Preparation of Audit
- Trust but Verify Approach – Audit Evidence
- Types of Audit Procedures Performed
- Automation of Controls
- Real-time Identification of Non-Compliance Issues
- Response and Records of Non-Compliance Issues
- Communication During An Audit
- Audit Procedures and Evaluation of Evidence – Auditors’ Point of View
- Drafting Audit Plans
- Audit Findings and Deviations
- Audit Closing Procedure
- Organizing a Closing Meeting and Stating The Conclusion of The Audit
- Auditors Opinion Results
- Deviations and Management’s Response
- Complementary User Entity Controls (CUECs)
- Sub Service Organizations Carved Out Controls
- Corrective Action Plans For The Following Audit Cycle
- Marketing Aspects and Logo Use
Meet our instructors:
Kyle is a former KPMG Analyst, now serving as a Senior Compliance Success Manager at Scytale, helping SaaS companies live out the compliance dream.
Wesley Van Zyl
After 4 years at Deloitte, Wesley is currently a Compliance Success Manager at Scytale, where he helps SaaS companies streamline their security compliance.
About this course
Geared towards CISOs, CTOs and Compliance Officers, leading the SOC 2 project in their organizations, this free SOC 2 masterclass provides a comprehensive overview of the fundamentals surrounding SOC 2 compliance.
Upon course completion, you will be awarded a SOC 2 Master Implementer Certification, as well as earn CPE hours.
“Where do I even start?”
So why should you start SOC 2 audit training today?
Here’s just a few of the main reasons:
Gain a thorough understanding of SOC 2 compliance and its requirements
Be informed on the process of SOC 2-readiness and the official audit
Gain the skills needed to lead your organization’s SOC 2 compliance project
Develop the knowledge needed to undergo SOC 2 and achieve compliance
Who can apply for free SOC 2 training?
Simply put, ANYONE! We created this course so people can become educated in the fundamentals of SOC 2 compliance and fully understand all the nitty gritty details
But we know if you do not need to learn about SOC 2, you probably won’t. And that’s why when we got the brilliant idea of a SOC 2 Academy, we specifically had in mind those leading the SOC 2 compliance process in their organization. CISOs, CTOs, compliance officers or SOC 2 first-timers, in need of the ultimate SOC 2 crash course, the SOC 2 Academy is calling your name!
June 8, 2023Digesting Compliance: How Scytale Gets You Audit-Ready
June 6, 202310 Go-To Tips for HIPAA Compliance
To help you get the most out of the numerous benefits HIPAA can provide your business, here are our ten go-to tips for HIPAA compliance.
May 25, 2023Security Compliance for Compliance Leaders
Everything you need to know about implementing a robust security program and understanding the requirements of data protection.
May 23, 2023SOC 2 Controls Explained for SaaS Startups
In this article, we’re looking at what SOC 2 controls are, and the role they play in becoming SOC 2 compliant.
May 22, 2023Digesting Compliance: Hear it Straight From the Experts
We asked our compliance expert team to walk us through how they help customers on a daily basis.
May 18, 2023ISO 27001 Certification Costs Stressing You Out? Let’s Break it Down for You!
Understand the ISO 27001 certification costs and discover how you can increase productivity without increasing the budget.
May 16, 2023Overcoming the Top Compliance Challenges (or Headaches) Faced by Leaders and Teams
Discover the most common challenges and pitfalls of compliance management and how you can avoid them.
May 11, 2023ChatGPT for the Compliance Professional: Will It Change Data Privacy in 2023
We're evaluating ChatGPT regarding its impact on data privacy, cybersecurity and compliance. Let's take a deep dive.
May 9, 2023Introducing the New Edition of Our Auditor Mode!
Let’s take a look at the latest exciting additions and enhancements to our security compliance automation platform!
May 3, 2023How to Evaluate Security Compliance Software Before Purchasing
To help you find the ideal security compliance software for your organization, here’s our checklist of top ten things to look out for.
May 3, 2023Everything You Need to Know About The NIS 2 Directive
This webinar, in partnership with Brand Compliance, uncovers all the details regarding the new version of the NIS 2 Directive.
May 3, 2023Are You Compliant Yet? How to Streamline SOC 2 and ISO 27001 with Automation
Scytale's CEO, Meiran Galis and Cloudflare's Regional Sales Manager, Guy Ben Zvi discuss best practices for streamlining compliance.
April 27, 2023A Peek at PCI DSS
Learn all about PCI DSS compliance in our insightful PCI DSS one-pager.
April 27, 2023What are ISO 27001 KPIs and How to Measure them?
ISO 27001 key performance indicators (KPIs) are metrics that assess the operating effectiveness of your ISMS.
April 25, 202310 HIPAA Violations to Watch Out for While Working Remotely
The transition from paper to technology has improved care, connection, and processes, but it has also added more cybersecurity risks.
WHAT OUR CUSTOMERS SAY ABOUT US
Omer Rimoch CTO PayEm
Scytale exceeded our expectations. We continued operating as normal during our audit preparation. Our SOC 2 workflows were super organized, which made it the smoothest process we could have asked for.
Yaron Lavi CTO, Deel
Our SOC 2 audit preparation was smooth sailing. Scytale streamlined the process by providing expert-driven technology. They shared valuable insights about our security systems so we can better protect our customers’ data.
Tal Kollender CEO, GYTPOL
We couldn’t have undergone our SOC 2 audit without Scytale. Their team and smart automation made the process simple and timesaving. We gained valuable knowledge about our security systems and had fun working together.