Resources

Curated content for the compliance connoisseur: We cover the latest on frameworks, risks, and security trends.

Show filters

All

Blogs

Tags
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Upcoming
On-demand
ISO 27001
Blog
Risk assessment 101: Working backwards from the controls

Matt Cooper, Principal, Cybersecurity and Data Privacy, shares how to work backwards with a controls framework for assessing risk in order to meet the requirements for ISO 27001 compliance.

Risk Management
Cybersecurity
Experts
Upcoming
On-demand
SOC 2
Blog
How to identify and close gaps in SOC 2 compliance

If something is missing in your SOC 2 compliance, it’s important to plug the gap as soon as possible. Learn how to uncover SOC 2 issues and keep your business safe.

Compliance
Cybersecurity
Features
Upcoming
On-demand
Security
Blog
Vanta’s 6 principles for pragmatic startup security

Thinking your startup's security isn't where it should be? These six principles will get you on the right path.

Cybersecurity
Startups
Features
Experts
Upcoming
On-demand
Compliance
Blog
Why PCI compliance matters for SaaS startups

Learn how big data and fintech companies can prove their security posture with PCI DSS compliance certification and why it doesn't have to be as complicated as you might think.

Startups
Compliance
Upcoming
On-demand
ISO 27001
Blog
The importance of choosing the right auditor

Wondering how to choose an auditor? Vanta's cybersecurity and data privacy expert Matt Cooper offers a few words of advice.

Experts
Compliance
Risk Management
Partners
Upcoming
On-demand
SOC 2
Blog
The SOC 2 Compliance Checklist

Simplify and expedite your company’s SOC 2 audit and report process with Vanta. This checklist walks through the SOC 2 attestation process.

Compliance
Upcoming
On-demand
SOC 2
Blog
What is a SOC 2 bridge letter?

SOC 2 bridge letters can make or break your compliance program. Find out what they are and when you'll need to use them.

Compliance
Cybersecurity
Upcoming
On-demand
Compliance
Blog
How to secure your cardholder data environment and gain PCI DSS compliance

What is CDE and why is it essential to creating a secure business for your customers? Learn how to become PCI DSS compliant and the steps to ensure cardholder data.

Compliance
Cybersecurity
Features
Upcoming
On-demand
SOC 2
Blog
You've been asked to present your SOC 2

Don't panic! This blog post is here to help.

Compliance
Startups
No results found 🤷