Homepage
Open in app
Sign in
Get started
Whistic
The latest insights and updates on information security and third party risk management.
Posts About the Whistic Platform
Visit the Full Whistic Website
Follow
Late 2019 Product Updates
Late 2019 Product Updates
The latest product updates and exciting enhancements to the Whistic Platform:
Whistic
Dec 27, 2019
Updated VSA CORE Questionnaire Now Available on Whistic
Updated VSA CORE Questionnaire Now Available on Whistic
The Vendor Security Alliance, long one of the forerunners in vendor risk assessments and security questionnaires, released their newest…
Whistic
Dec 17, 2019
BYOQ — All of the Security Questionnaires Whistic Supports
BYOQ — All of the Security Questionnaires Whistic Supports
For many InfoSec teams, the end of a year means planning for new updates, thinking about new strategic initiatives, and doing an…
Whistic
Dec 12, 2019
The Whistic Guide to the CCPA
The Whistic Guide to the CCPA
Even though today’s security professionals are prepared for new compliance regulations being introduced on a regular basis, sometimes acts…
Whistic
Dec 4, 2019
Leveraging Vendor Risk Management Software to Grow and Expand
Leveraging Vendor Risk Management Software to Grow and Expand
As an HR innovation company focused on driving better hiring decisions through AI and machine learning, HireVue is used to being at the…
Whistic
Dec 3, 2019
Automating Vendor Risk Management Workflows
Automating Vendor Risk Management Workflows
As a pioneer in the financial technology services industry, Finicity has been leading the way with industry trends and best practices for…
Whistic
Nov 25, 2019
How Utility InfoSec Teams Need to Prepare for CIP-013 Regulations
How Utility InfoSec Teams Need to Prepare for CIP-013 Regulations
The North American Electric Reliability Corporation (NERC) is a regulatory authority for much of North America’s bulk power system…
Whistic
Nov 19, 2019
Whistic at CSA Summit/ISC(2) Security Congress
The Whistic team is heading to the CSA Summit at (ISC)2 Security Congress 2019 and we want to see you there! From Sunday, October 27 to…
Whistic
Oct 28, 2019
Join Whistic at Money 20/20
Join Whistic at Money 20/20
The Whistic team is on the road again, and this time we’re heading for Vegas! We’ll be at the Money 20/20 conference from October 27 to…
Whistic
Oct 8, 2019
Come see Whistic in Nashville!
Come see Whistic in Nashville!
Connect with the Whistic Team at ARMA InfoCon 2019
Whistic
Sep 26, 2019
What You Need to Know about SIG, SIG CORE, and SIG LITE in 2019
What You Need to Know about SIG, SIG CORE, and SIG LITE in 2019
The information security landscape is constantly changing and evolving. As new threats and risk emerge — and as the technology available…
Whistic
Sep 19, 2019
Whistic customer Doctor on Demand succeeds with streamlined process
Whistic customer Doctor on Demand succeeds with streamlined process
For Whistic customer Doctor on Demand, security had long since passed being just a nice-to-have item. As a telemedicine provider…
Whistic
Sep 10, 2019
What Your Higher Ed InfoSec Team Needs to Know about HECVAT
What Your Higher Ed InfoSec Team Needs to Know about HECVAT
In the world of security infrastructure and data privacy, there are a few industries that are always part of the conversation. Healthcare…
Whistic
Aug 15, 2019
How to Use the NIST SP 800–171 Cybersecurity Framework
How to Use the NIST SP 800–171 Cybersecurity Framework
While many InfoSec teams are well-prepared for almost anything that comes their way, cybersecurity is a constantly growing and changing…
Whistic
Aug 6, 2019
How to Become HIPAA Compliant: Your 6 Step Guide
How to Become HIPAA Compliant: Your 6 Step Guide
If there was an award for most recognizable security standard, HIPAA might walk away with gold. Any organization doing business with a…
Whistic
Jul 30, 2019
What is Zero Trust?
What is Zero Trust?
Most modern InfoSec teams have some sort of pattern or standard process for handling security concerns. Over time, these teams see enough…
Whistic
Jul 18, 2019
How to Utilize Whistic’s Questionnaire based on ISO 27001
How to Utilize Whistic’s Questionnaire based on ISO 27001
At Whistic, we’re on a mission to provide the most in-depth, secure standards and regulations to our clients. This means that we’re…
Whistic
Jul 16, 2019
Phase 5 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 5 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 5: Proactive Solutions
Whistic
Jul 11, 2019
A Better Way to Share Your SOC 2 Type II Audit Report with Customers
A Better Way to Share Your SOC 2 Type II Audit Report with Customers
While some companies perform SOC 2 Type II audits for various different reasons, most organizations do so to protect the security and…
Whistic
Jul 9, 2019
What is Fourth-Party Risk, Why it’s Important, and How to Address It
What is Fourth-Party Risk, Why it’s Important, and How to Address It
As an information and data security professional, you’re most likely well versed in third-party risk strategy. While the modern supply…
Whistic
Jul 2, 2019
Phase 4 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 4 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 4: Realization
Whistic
Jun 28, 2019
4 Steps to Prepare for The California Consumer Privacy Act (CCPA)
4 Steps to Prepare for The California Consumer Privacy Act (CCPA)
The world as we know it continues to grow and change. In 2019, experts predict that the population of California will grow to over 40…
Whistic
Jun 27, 2019
Phase 3 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 3 of The 5 Phases of Responding to a Security Questionnaire & How To Get Proactive
Phase 3: Knowledge Base Creation
Whistic
Jun 25, 2019
Internal Security Audits Identify Crucial Deficiencies
Internal Security Audits Identify Crucial Deficiencies
At Whistic, we work with a lot of companies that want to get started with vendor risk management but don’t know how. Many times, these…
Whistic
Jun 19, 2019
Phase 2 of The 5 Phases of Responding to a Security Questionnaire & How to Get Proactive
Phase 2 of The 5 Phases of Responding to a Security Questionnaire & How to Get Proactive
Phase 2: Interdepartmental Communication
Whistic
Jun 14, 2019
About Whistic
Latest Stories
Archive
About Medium
Terms
Privacy
Teams