Latest Content

Stay up to date and discover new insights into compliance through our team’s thought leadership

  • Type 1 vs. Type 2 in SOC Reports

    Type 1 vs. Type 2 in SOC Reports

    Trying to decide between a Type 1 or a Type 2 SOC report? Learn the differences and benefits to understand what suits your organization best.

    Read Article
  • How to Write a Burp Suite Extension

    How to Write a Burp Suite Extension

    Working with Burp and finding that you need a workaround? Learn how to build your own extension and potentially solve your problem.

    Read Article
  • Key Takeaways From CMMC 2.0

    Key Takeaways From CMMC 2.0

    Now that CMMC 2.0 has been released, learn about the new updates to the program and what to expect moving forward.

    Read Article
  • ×

    First Name
    !
    Success
    Error - something went wrong!
  • Veteran Rockstar

    Veteran Rockstar

    Read Flipbook
  • What are the SOC 2 Trust Services Categories?

    What are the SOC 2 Trust Services Categories?

    If you’re someone who is considering a SOC 2 audit, learn about the Trust Services Categories and how to choose yours.

    Read Article
  • How Long Does a SOC 2 Examination Take?1:51

    How Long Does a SOC 2 Examination Take?

    What is the typical timeline for a SOC 2 Examination? Ryan Buckner has your answer.

    Watch Video
  • IT Audit 102: A Brief History

    IT Audit 102: A Brief History

    Security compliance is a diverse space these days, but how did we get here?

    Read Article
  • Using Mind Maps in Application Security Testing

    Using Mind Maps in Application Security Testing

    Making AppSec penetration testing assessments more streamlined through application mapping

    Read Article
  • Get Ready to Speak OSCAL45:38

    Get Ready to Speak OSCAL

    View Webinar
  • Litmus Case Study

    Litmus Case Study

    Litmus Leverages Proactive Approach to Privacy to Protect Itself, Clients, & Vendors

    Read Flipbook
  • 5 Cornerstones to a Successful Cybersecurity Program

    5 Cornerstones to a Successful Cybersecurity Program

    Five fundamentals organizations should consider when building a comprehensive cybersecurity program

    Read Article
  • What Does a SOC 2 Examination Cost?6:52

    What Does a SOC 2 Examination Cost?

    Watch Video
  • The World of Privacy53:29

    The World of Privacy

    Watch Video
  • Leveraging Technology for Continuous Cross-Domain Compliance and Audit51:52

    Leveraging Technology for Continuous Cross-Domain Compliance and Audit

    View Webinar
  • IoT Security and Privacy50:16

    IoT Security and Privacy

    Watch Video
  • Audit Fatigue53:24

    Audit Fatigue

    View Webinar
  • What is the difference between a Type 1 and a Type 2 SOC Report?2:39

    What is the difference between a Type 1 and a Type 2 SOC Report?

    With 5 different SOC reports, Ryan Buckner breaks down the difference between a Type 1 and Type 2 SOC examination.

    Watch Video
  • Schellman Now an Authorized CMMC Third Party Assessment Organization (C3PAO)

    Schellman Now an Authorized CMMC Third Party Assessment Organization (C3PAO)

    Schellman becomes the first compliance services firm authorized by the CMMC AB and the 5th C3PAO Overall October 19, 2021 (Tampa, FL) – Schellman is pleased to announce that we are now...

    Read Article
  • My Puerto Rican Heritage and What it Means to Me

    My Puerto Rican Heritage and What it Means to Me

    Schellman's Danny Valentin reflects on his Puerto Rican heritage in honor of Hispanic Heritage Month

    Read Article
  • Corcentric Case Study

    Corcentric Case Study

    New Acquisitions Prove No Problem for Corcentric, Who Continue to Roll in Compliance

    Read Flipbook
  • loading
    Loading More...