kirkpatrickprice logo
  • Explore
    • AWS
    • Azure
    • GCP
    • Information Security Policy
    • PCI Assessment
    • Risk Assessment
    • SOC 2 Audit
  • Audit
    • Start A Scan
    • Information Security Policy Review
    • PCI Report Analysis
    • Risk Assessment Review
    • SOC 2 Report Analysis
  • Learn
  • Contact
  • Pricing
  • Overview
  • Identify
    • Management Control
    • Regulatory Compliance
    • Risk Assessment
    • Vendor Management
    • Penetration Testing
  • Protect
    • Human Resources
    • Physical Security
    • Service Delivery
    • Application Development
    • Configuration Management
    • Data Security
    • Logical Access
    • Information Security Policy
  • Detect
    • Environmental Security
    • Network Monitoring
    • Vulnerability Management
  • Respond
    • Incident Response
    • Training
  • Recover
    • Backup and Restoration
    • Business Continuity and Disaster Recovery

Risk Mitigation

Learn how risk management is the foundation of the control environment and provides boundaries for your audit.

4 Ways to Treat Risk
Communicating Risk Assessment Results
How to Identify, Analyze, and Manage Risks to Objectives
Identify and Assess Changes That Could Impact Internal Controls
SOC 2 Academy - How to Manage Risks
SOC 2 Academy - What Types of Risks Does Your Organization Face?
SOC 2 Academy: Assessing Changes Within Your Organization
SOC 2 Academy: Assessing the Significance of Risk
SOC 2 Academy: How Fraud Can Impact Risk
SOC 2 Academy: Identifying Vendors as Carve-Out or Inclusive
SOC 2 Academy: Managing Vendor Risk
SOC 2 Academy: Mitigating Risks that Lead to Business Disruption
SOC 2 Academy: Risks from Business Partners
SOC 2 Academy: Using a Risk Assessment
SOC 2 Academy: Who Should Make Updates to Your Risk Assessment?
The Assessment of Fraud for SOC 2

Partner with us

Our information security auditors are ready to assist you with your compliance challenges. Schedule an appointment with our certified specialists to get the conversation started!

Connect with a Live Expert
kirkpatrickprice logo

Explore

AWS SecurityAzure SecurityGCP SecurityRisk AssessmentInformation Security PolicyWorkshops

Audit

Start a ScanSubmit your risk assessmentSubmit your information security policyChecks we performView your reportAWS connection instructionsAzure connection instructionsGCP connection instructions

Learn

IdentifyProtectDetectRespondRecover

Contact

Live — Online Experts

About

Visit kirkpatrickprice.comFollow Us on LinkedInTerms and ConditionsPrivacy PolicySecurity