Google Tag:

Learn with Trava

Podcasts

Getting CMMC Right: Scope, Budget, and Certification Tips

Think compliance is just an IT problem? It’s a revenue problem, too. Without it, some contracts will stay out of reach. Jara Rowe talks with Tom Greco, vCISO at Trava Security, about what companies need to know about the Cybersecurity Maturity Model Certification...

Person at desk with laptop
Blog

How Do I Prepare for an ISO 27001 Audit?

ISO 27001 is a widely recognized international standard for information security. Earning it can help your company stand out and win new clients. But as Anh Pham, Director of Pentesting and Security for Trava notes, “ISO 27001 [is] a structured...

Blog

ISO 27001 Audit: What You Need To Know

The International Organization for Standardization (ISO) sets standards for various industries. One of its globally recognized standards is ISO 27001, which provides guidelines for managing and protecting information in a company.  To prove compliance with ISO...

Blog

How Do I Find a SOC 2 Auditor?

How to find a SOC 2 auditor is a major concern for any organization that processes, stores, or transmits client or partner data. SOC 2 (System and Organization Controls 2) was developed by the American Institute of Certified Public Accountants (AICPA) as a...

computer key that says asess risk
Blog

How To Perform a Security Risk Assessment for Your Business

Data breaches and cyberattacks are no longer merely IT problems. They can disrupt operations, cause financial losses, and damage your reputation. What's more, data compromises can introduce a raft of legal and data privacy implications. Yet, many small and...

Blog

What Is a vCISO and Why Does Your Business Need One?

Protecting your business’s information and systems is crucial. But for many companies, hiring a full-time Chief Information Security Officer (CISO) can be expensive and unnecessary. That’s where a vCISO—or Virtual Chief Information Security Officer—comes in. Let’s...

Blog

What Are CMMC Compliance Requirements?

If you want to win valuable contracts from the Department of Defense, you’ll first need to reach CMMC compliance. This cybersecurity framework sets standards that every DoD contractor must meet. It has three levels with increasing requirements. Some are similar...