ISO 27001: The Four Most Common Post-Certification Pitfalls

Author: Gene Geiger, CPA, CISSP, CCSK, QSA, PCIP, ISO 27k LA, and Partner at A-LIGN. Becoming ISO 27001 certified is a rigorous process for most organizations but the work should not stop after receiving the sought after certification. We want to ensure that your organization does not fall…

Read More

HITRUST Assessment Scoping Guidelines

We are asked routinely “which controls will A-LIGN test as part of the HITRUST assessment?”.  The answer to that question depends on the environment and the outcome of the scoping process.  Scoping occurs in the initial phases of your HITRUST assessment process in order to…

Read More

Preparing for PCI DSS 3.2 in 2016

  Author: Dustin Rich, CISSP, (ISC)2, CISA, ISACA, PCI QSA, PA QSA, MCSE, CCNA, CCA, and Managing Consultant at A-LIGN. This update, which will likely take place of the previously anticipated Q4 2016 update, will include changes that aim to take into account…

Read More

Strengthening the Cloud: ISO 27017 and ISO 27018

As the global usage of cloud technology continues to grow, businesses must strategically consider the risk of storing protected information and explore security options in order to protect their information systems. There are multiple security standards for cloud services providers and users to utilize in order to…

Read More

What Penetration Tests Reveal: The Top 3 Findings

Author: Greg Johnson, Vice President of Business Development at A-LIGN. The hacking industry was alive and well in 2015, and it’s funny how the majority of attack vectors haven’t changed in the past five years. I thought it would be interesting to share…

Read More

Work for It: Earning Our Clients’ Business

Author: Scot Thrower, Business Development Manager at A-LIGN. Feeling stuck in a relationship with your current audit and security solutions provider? It doesn’t have to be that way! A-LIGN provides compliance solutions without multi-year contracts or strings attached. While other providers lock you into costly, multi-year contracts…

Read More

Illusion of Insignificance: Cybersecurity and the Small Business

Author: Stuart Rorer, Senior Consultant at A-LIGN. “Big Box Store ABC Has Been Hacked, Customer Card Information Exposed!” “E-Commerce Giant Acme Inc., Suffers Cyber Intrusion” Headlines like these are appearing each day, most of which seem to apply to big box stores…

Read More

An Overview of the HITRUST CSF and Related Frameworks

The HITRUST CSF is a comprehensive, certifiable security framework that pulls from HIPAA/HITECH, ISO 27001, NIST SP 800-53, COBIT, and PCI DSS, combining them to create a powerful framework. The HITRUST CSF provides an integrated, prescriptive framework that works with the needs…

Read More

HITRUST Assessment Types & HITRUST Integration with SOC 2

Don’t make the climb to compliance more difficult than it has to be. With a comprehensive framework for organizations of any size, system or regulatory requirement, the HITRUST CSF allows for organizations to easily assess their current compliance while providing implementation requirements based on an organization’s risk…

Read More

Understanding the HITRUST Specification and Scoring

HITRUST’s Risk Management Framework In order for an organization to better assess potential risks and create safeguards for adequate protection of potentially sensitive information, HITRUST has created a comprehensive risk management framework that supports a basic 4-step process: Identify risks and define the protection requirements Specify controls Implement and manage…

Read More