SOC 2 Audit: How It Is Conducted and What the Auditor Reviews Artikel / Sofie Ax SOC 2 Audit: How It Is Conducted and What the Auditor Reviews Read More »
When Budgets Level Off but Threats Increase – How Do You Prioritise Effectively? Blogginlägg / Sofie Ax When Budgets Level Off but Threats Increase – How Do You Prioritise Effectively? Read More »
Information Security 2026 – What Does It Mean in Practice? Blogginlägg / Sofie Ax Information Security 2026 – What Does It Mean in Practice? Read More »
Maturity Models and Continuous Improvement in information security Artikel / Sofie Ax Maturity Models and Continuous Improvement in information security Read More »
SOC 2 Report: Structure, Content and What Customers Review Artikel / Sofie Ax SOC 2 Report: Structure, Content and What Customers Review Read More »
A clear overview of the Trust Services Criteria Artikel / Sofie Ax A clear overview of the Trust Services Criteria Read More »
SOC 2 Type II – Content, Requirements and Timeline Artikel / Sofie Ax SOC 2 Type II – Content, Requirements and Timeline Read More »
SOC 2 Type I vs Type II – What’s the Difference? Artikel / Sofie Ax SOC 2 Type I vs Type II – What’s the Difference? Read More »
SOC 2 Compliance – Step-by-Step Process Artikel / Sofie Ax SOC 2 Compliance – Step-by-Step Process Read More »