Security Certification: Gain Competitive Advantage as the Low Risk Option

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Security certifications such as ISO 27001 and SOC 2 are becoming table stakes for passing vendor assessments when looking to sell to new companies and renew existing contracts. As security demands continue the trend of becoming more and more stringent, information security teams are having to do more with the same or even reduced resources.

In this webinar, a panel of experts will discuss how security teams are tackling this problem and outline some of the tools they use to make managing their increasing workload more manageable, along with highlighting the efficiencies that can be realized when pursuing multiple security certifications.

Key takeaways:

  • The business and competitive benefits of pursuing security certifications such as ISO 27001 and SOC 2
  • How to deal with increased security demand with limited resources
  • Best practice for achieving and maintaining security certifications


Danny Bradbury

Contributing Writer & North America Webinar Moderator

Anthony Galfo

Information Security & Privacy Consultant

    Peter Philp

    Head of Information Security Sales, Resolver

      Mike  Wertman

      CTO, Resolver

        Dixon  Wright

        VP of Assurance Services, Coalfire

          Brought to You by

          Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.