Austin Songer
  • Home
  • Compliance Products
  • My Small Bio
Sign in Subscribe
Austin Songer

Austin Songer

Evidence Gathering Recommendation: Adding TimeStamp To Screenshots
GRC

Evidence Gathering Recommendation: Adding TimeStamp To Screenshots

Install Timestamp App * https://github.com/mzdr/timestamp When Taking Screenshots Remember
Read More
Austin Songer
Mapping Security Controls to the HITRUST framework
GRC

Mapping Security Controls to the HITRUST framework

Mapping your security controls to the HITRUST Common Security Framework (CSF) is
Read More
Austin Songer
SOC 2: Selecting a SOC 2 Auditor
SOC2

SOC 2: Selecting a SOC 2 Auditor

Selecting a SOC 2 auditor is an important decision for any organization,
Read More
Austin Songer
SOC 2: Overcoming Common Roadblocks
SOC2

SOC 2: Overcoming Common Roadblocks

As an organization, undergoing a SOC 2 audit can be a complex
Read More
Austin Songer
SOC 2 Audit Process

SOC 2 Audit Process

SOC 2 is a cybersecurity audit that evaluates an organization's
Read More
Austin Songer
Slack Best Practices Part 1: Channel Naming

Slack Best Practices Part 1: Channel Naming

Part 2 will be covering "Slack Usage Policy" Part 3
Read More
Austin Songer
ISO 27001:2022
compliance

ISO 27001:2022

The new version of ISO 27001 will be released sometime in the
Read More
Austin Songer
SOC2 Vendor Management Policy

SOC2 Vendor Management Policy

Purpose and Scope * This policy defines the rules for relationships with the
Read More
Austin Songer
SOC2 Workstation Policy
compliance

SOC2 Workstation Policy

Loading...
Read More
Austin Songer
List of Information Security Metrics to Track
Security Governance

List of Information Security Metrics to Track

Organizational * Information Security Budget as Percentage of IT Budget * Information Security Budget
Read More
Austin Songer
Risk Catalogue
Risk

Risk Catalogue

RISK CATALOG use case: * What are the risks associated with a control
Read More
Austin Songer
Threat Catalogue
Risk

Threat Catalogue

THREAT CATALOG use case: What natural and man-made threats affect control execution?
Read More
Austin Songer
Austin Songer © 2025
Powered by Ghost