WEBINAR: SOC 2 and You: Overview and Update

March 9, 2016

Increasing concerns regarding information security have heightened scrutiny of service organizations’ control infrastructure and driven demand for attestation reports.  As a result, the SOC 2 examination's popularity has increased dramatically since its inception in January 2010. The SOC 2’s operational and security-centric scope and the Webtrust based control framework, allows for an attestation process that addresses critical security concerns that customers have regarding third party services.

Join Schellman and Company, Inc. during a complimentary (1 CPE) webinar titled “SOC 2 and You: Overview and Updates” on March 11th from 12:00 pm EST to 1:00 pm EST.  Debbie Zaller, Principal, and Danny Manimbo, Manager, will provide an in-depth review of the SOC 2 report objectives, discuss structure and areas to focus, and participants will also benefit from valuable lessons learned from Schellman’s extensive SOC 2 experience.

Although the SOC 2 report is just approaching its 6-year anniversary, the demand and interest in this reporting mechanism has been significant thus far,” said Debbie Zaller.  “Our webinar is intended to match the enthusiasm and interest in SOC 2 reporting with a discussion of not only the fundamentals of SOC 2 reporting but also share success strategies to overcome many of the common pitfalls experienced by organizations preparing for these examinations.

This informative webinar will provide:

  • An overview of the SOC 2 background
  • A definition of the AICPA Framework
  • An overview of the SOC 2 purpose and scope
  • The major components of a SOC 2 report
  • A discussion of the common challenges and benefits

Register now for the SOC 2 and You webinar

The event will also be recorded and available for on-demand viewing, more information will be posted on the Resources Page

Previous Article
Not A Game of Eeny, Meeny, Miny, Moe: Do Data Centers Need a SOC 1 or SOC 2?
Not A Game of Eeny, Meeny, Miny, Moe: Do Data Centers Need a SOC 1 or SOC 2?

The first question many service organizations have when they begin the process of researching Service Organ...

Next Article
SOC 2: Build Trust and Confidence - Overview and Considerations
SOC 2: Build Trust and Confidence - Overview and Considerations

Increasing concerns regarding information security have heightened scrutiny of service organizations’ contr...