Error loading player: No playable sources found

200

SAS 70 Compliance

Date
June 8, 2010

The expanded use of third party service providers by many organizations has left auditors and risk managers struggling to assertion vendor management, legislative and regulatory requirements from internal control procedures outside the ownership of their organization. As a result, the demand for SAS 70 compliance continues to gain momentum as these organizations are tasked with gaining assurance on the relevant internal controls and controls around financial reporting necessary to assist in managing third party service provider risk. This session will provide practitioners with information relevant to understanding SAS 70 compliance. Coverage will include SAS 70 usage, reporting, common areas of coverage, and comparisons with other types of attestations. The information will be relevant for members in the third party service provider industry, practitioners with third party service provider clientele, in addition to the user organizations and user auditors they serve.

Speaker

Speaker Image for Steven Ursillo
Partner, Risk Accounting and Advisory, Information Assurance and Cybersecurity, Cherry Bekaert

Related Products

Thumbnail for Ask the Experts - Panel and Closing Remarks
Ask the Experts - Panel and Closing Remarks
This session will grant attendees the opportunity to bring forward questions relevant to matters of SOC and Third-Party Risk. All topics are fair game; our panel of experts will facilitate dialogue and deliver answers on the spot…
Thumbnail for Best Practices Around Cyber and Risk Advisory Services (TCH, PRA)
Best Practices Around Cyber and Risk Advisory Services (TCH, PRA)
In today's dynamic and evolving cybersecurity landscape, managing cyber risks is a top priority for organizations worldwide…
Thumbnail for Want to Start a Cyber Practice? A Step By Step Guide to Help Insure Success (TCH, PRAC)
Want to Start a Cyber Practice? A Step By Step Guide to Help Insure Success (TCH, PRAC)
In today's rapidly evolving digital landscape, cybersecurity threats are becoming more sophisticated, targeted and frequent. As a result, businesses and organizations are seeking professional services to help them protect their sensitive data and networks…
Thumbnail for Cybersecurity Risk Management Strategies for Emerging Cyber Threats (TCH, TPR)
Cybersecurity Risk Management Strategies for Emerging Cyber Threats (TCH, TPR)
Learn how to navigate the intricate and evolving landscapes of cloud and application programming interface (API) security, artificial intelligence (AI), zero trust, identify and access management (IdAM), internet of things (IoT), and more in this insightful session…

This site uses cookies to store information on your computer. Some are essential to make our site work, others help us improve, the user experience. By using the site, you consent to the placement of these cookies. Visit our Privacy Center to learn more.