© 2017-2020 Caplock Security LLC

  • Twitter Social Icon
  • Black LinkedIn Icon

NEWS & EVENTS

 

January 19, 2020

Do you need a quick primer on blockchain technology? Curious about the current adoption of blockchain technology relating to financial institutions? What are the use cases? Caplock Security and its partner InfoSight have prepared this two-part whitepaper to discuss in details the pros and cons of this nascent technology that is disrupting financial instit...

August 27, 2019

Smart contracts enable automated execution of agreements, rights, and obligations in digital form between two of more parties using tamper-proof execution of computer code. By providing standardization, speed, security, and certainty to transaction settlement, smart contracts are posed for rapid adoption as organizations seek to reduce transaction costs b...

February 14, 2019

ISACA released its long awaited guidance on Blockchain Technology Audit Preparation. As blockchain is still an emerging technology, there is not yet a published uniform auditing standard. However, this program is intended to help organizations identify and develop key policies, procedures and controls to mitigate risk and streamline processes. 

Blockc...

January 15, 2019

Tuan Phan authored an article for the esteemed ISC2 January-February Issue of InfoSecurity Professional Magazine. The article discussed the implications of blockchain technology on cybersecurity professionals, and privacy and security matters. The article can be downloaded from this location.

November 22, 2018

Tuan Phan introduced the attendees to a fresh perspective of blockchain technology and how it may impact the IT auditing and cybersecurity professionals in the coming years.

Tuan approached the topic a bit differently and the presentation is rated as intermediate level. The presentation was not about cryptocurrencies but was on the core concepts of blockch...

July 2, 2018

In the last part we discussed how control implementation can be documented.  This week, we will discuss how to document control effectiveness based on the collected evidence.

Assessment result for the control (column N) can be selected by clicking on one of the assessment statuses from the AA Menubar. When selected, the user is presented with the Control...

June 11, 2018

In Part 3 of the Assessment Accelerator, we will review how AA can rapidly implement control implementation for your organization.

By this time you have already categorized your system and set the assessment view, or the assessment plan to be performed.  If you have not, review Part 2 of this post.

Navigate your cursor to the topmost row of the control to b...

June 4, 2018

In Part 2 on Assessment Accelerator, we will explore how quickly a system can be setup for an assessment according to an assessment plan.

From the AA toolbar, select the System Information Setting button.

From the Configuration Settings form, enter the System Information for the information system to be assessed. Categorization is important because that def...

May 31, 2018

This week blog is a teaser to our beta-release of Assessment Accelerator (AA). We have been working hard on this productivity toolkit for all of the assessors out there to enhance and maximize your assessment process.

From ISO to PCI DSS to FISMA, assessments require the assessors to systematically step through a series of controls, to review the implement...

June 11, 2017

According to Gartner, the worldwide spending in 2016 on information security products and services exceeded $81.6 billion with IT Outsourcing, Security Testing and Data Loss Prevention provided some of the largest growth opportunities. The challenge that most organizations face is how to effectively recoup these investments at the level of return of inves...

Please reload