Resources

Check out our resources, ideas & guidance for creating an automated and scalable Infosec Compliance practice.

/_next/static/media/svg-horizontal.85e8651f.svg
Select Category...
SOC 2 eBook.png
Guide

Getting Started with SOC 2 Compliance [eBook]

SOC 2 can be an overwhelming project to start from scratch. Here is an ebook that will help you with the process. This is but one of the numerous ControlMap resources at your disposal to help you get started on the road to compliance.
Read More
TeleBright PR blog.png
Press Releases

ControlMap helps TeleBright with SOC 2 Type 2

Press Release Published: 06/14/2022. TeleBright, an industry leader in centralized expense management for telecom and energy, is pleased to announce its completion of SOC 2 Type 2 ...
Read More
BlinkIdentity Case study Graphic (1080 × 800 px).png
Case Studies

Case Study of Blink Identity

Blink Identity completes its first SOC 2 audit successfully with ControlMap. Our platform served as the primary solution to help manage SOC 2 controls,...
Read More
RFPIO white BG.png
Case Studies

Case Study of RFPIO

See how ControlMap helped RFPIO with Information Security and Compliance Programs, significantly accelerating and streamlining their audit preparation.
Read More
blink (2).png
Press Releases

ControlMap helps Blink Identity with SOC 2 Type 1

Press Release Published: 04/21/2022. Blink Identity, a leader in providing in-motion facial recognition services, is pleased to announce that it has successfully completed SOC 2 Type 1 audit...
Read More
block-3.jpeg
Blog

Five things to do for SOC 2 before auditors arrive

Getting ready for your SOC 2 audit? Here is a SOC 2 compliance checklist with 5 things that you should do while getting ready for the yearly SOC 2 audit.
Read More
block-4.png
Blog

SecOps DevOps DevSecOps Infosec Compliance

Here is a brief overview of the differences between DevOps, SecOps, and DevSecOps and how they play a role in IT compliance. Read along to know about it.
Read More
how to build a culture of compliance.png
Blog

How to Build a Culture of IT Compliance

What is a culture of compliance? In this blog post, we break it down into 5 steps for building a solid culture of compliance.
Read More
Reaching the Summit watch now.png
Blog

Webinar retrospective Reaching the Summit

It may sound overwhelming but if you take a risk-based approach to achieve cybersecurity compliance, you'll find it much less intimidating and the results will most likely satisfy whatever audit framework you choose to pursue.
Read More
ISOIEC 27001 .png
Blog

A Beginner’s Overview of ISO/IEC 27001

A Beginner’s Overview of ISO/IEC 27001 is intended to help you understand what it is, its importance, and how to begin the journey toward ISO 27001 certification.
Read More
policy.png
Blog

Top 10 Policies for SOC 2, ISO 27001 compliance

Here is a list of the Top Ten Mandatory policies that each company should put in place when they start their SOC2, ISO 27001, or FEDRAMP journey...
Read More
CMMC.png
Blog

Why the Cybersecurity Maturity Model Certification (CMMC) Matters Now?

The Cybersecurity Maturity Model Certification (CMMC) is here. As mentioned in other blog posts, without a single standard to govern all cybersecurity risks...
Read More