Achieving Excellence through ISMS Implementation
An Information Security Management System (ISMS) is key to safeguarding your business and protecting sensitive data.
Compliance Success Manager
Robyn holds a Bachelors of Political Sciences in International Relations and achieved her post-graduate qualification in Risk Management. She gained InfoSec experience as an Information Security Assistant at the U.S. Embassy & Consulate General.
She is now a member of Scytale’s Compliance Success Team where she combines her knowledge and experience of industry best practices to assist clients in achieving their compliance objectives.
An Information Security Management System (ISMS) is key to safeguarding your business and protecting sensitive data.
Dive into this blog to find out why early-stage startups need to prioritize compliance to attract investors and mitigate risks.
ISO 270001 or SOC 2. Which is right for your business? It’s a common question.
Discover how NIST password guidelines evolved to prioritize longer, user-friendly passwords, reducing resets and boosting security for 2024.
Explore essential risk assessment methodologies to safeguard your organization and find the best fit for your needs.
Change the way you’re answering security questionnaires and learn how to leverage effective security questionnaire automation.
This blog discusses the essentials of PCI DSS compliance, and the 5 best practices for maintaining compliance.
This blog gives an overview of the Sisense breach, the types of data compromised in the hack, and lessons for companies to learn from.
This blog delves into how continuous monitoring enhances the effectiveness of security frameworks, like ISO 27001, NIST CSF and SOC 2.
In this blog, we’ll walk through best practices for getting audit-ready, from getting your documentation together to prepping your team.
Everything you need to know about getting ISO 27001 certified step-by-step without needing to be a tech wiz.
A guide to compliance frameworks for startups, with everything you need to know about the most common frameworks and how they apply.