What are the SOC 2 requirements as it relates to vulnerability management?
What do I need to watch out for when I schedule a penetration test? What are others doing to comply cost-effectively?
Topics in this webinar include:
- The relevant SOC 2 criteria impacting vulnerability management
- How to compliantly configure a penetration test
- Cost-effective strategies to comply with SOC 2
- Get inside the head of a SOC 2 auditor
Download the webinar:
The webinar was recorded in September 2018 and we’ve made it available for download by filling out the form below.
Send me the webinar recording and slides: