
SOC 2 COMPLIANCE TRAINING
SOC 2 compliance training Highlights
-
Gap Assessment
-
Defining HLS, Scope identification & context for SOC 2
-
Evaluating SOC 2 requirements
-
SOC2 – A.T. 101,
-
TSP 100 (CC1.0,CC2.0, CC3.0, CC4.0, CC5.0, CC6.0, CC7.0, A 1.1, A1.2, A1.3, P11.1,P11.2, P113. P11.4, P11.5,P11.6)
-
Integrated management System process maps
-
Development of SOC 2 assertiveness management System policy
-
Development of SOC2 management System procedures
-
RRAA, and SOC2 management System enforcement on RRAA
-
Adoption of Integrated management System policies
-
Developing SOC 2 Awareness training to employees
-
SOC 2 management System Risk methodology and Integrated management System Risk Identification techniques
-
Conducting SOC 2 management System risk management system
-
SOC 2 management System risk treatment
-
SOC 2 management System controls selection , mapping and evaluation
-
Review mechanism of SOC 2 management System risk assessment & Risk treatment
-
SOC 2 management System privacy practices & security controls implementation
-
Adoption of potential SOC 2 management System breach protocols
-
Inputs for SOC 2 management System test papers for employees Internal training
-
SOC 2 management System communication matrix
-
SOC 2 management System administrative control
-
SOC 2 management System technical controls
Who should attend training for SOC 2 compliance
This is intended for those who will be involved in implementing of SOC 2 compliance include:
Security managers
IT and corporate security managers
Corporate governance managers
Risk and compliance managers
Security consultants, HODs/Deputy HODs