Resources

Curated content for the trust management expert. Get the latest on security trends, compliance frameworks, and Vanta news.

Show more filters

Latest

Company news
Blog
Vanta earns ISO 42001 certification to demonstrate trustworthy AI practices

We’re excited to announce that Vanta is one of the first companies to earn ISO 42001 certification.

Product updates
Blog
New capabilities automate inbound questionnaires and demonstrate trust to customers at scale

New Trust Center and Questionnaire Automation capabilities enable organizations to customize security documentation and collaborate more effectively

Vendor Risk Management
Blog
Enhanced VRM solution unlocks how organizations manage, monitor, and maintain oversight of third-party risk

Vanta’s vendor risk management solution transforms vendor security from a manual checkbox exercise into an automated, continuous monitoring process.

Get the latest news and resources in your inbox.  Sign up for our newsletter!

Popular resources

Popular Resources SOC 2Popular guide to GRCPopular Resources ISO27001Ultimate TRM

All resources

Categories
Tags
Showing search results for:
Text
Compliance
Blog
Why PCI compliance matters for SaaS startups

Learn how big data and fintech companies can prove their security posture with PCI DSS compliance certification and why it doesn't have to be as complicated as you might think.

Startups
Compliance
Upcoming
On-demand
Security
Blog
Vanta’s 6 principles for pragmatic startup security

Thinking your startup's security isn't where it should be? These six principles will get you on the right path.

Cybersecurity
Startups
Features
Experts
Upcoming
On-demand
SOC 2
Blog
How to identify and close gaps in SOC 2 compliance

If something is missing in your SOC 2 compliance, it’s important to plug the gap as soon as possible. Learn how to uncover SOC 2 issues and keep your business safe.

Compliance
Cybersecurity
Features
Upcoming
On-demand
ISO 27001
Blog
Risk assessment 101: Working backwards from the controls

Matt Cooper, Principal, Cybersecurity and Data Privacy, shares how to work backwards with a controls framework for assessing risk in order to meet the requirements for ISO 27001 compliance.

Risk Management
Cybersecurity
Experts
Upcoming
On-demand
HIPAA
Guide / Report
HIPAA compliance checklist

Our HIPAA compliance checklist will help simplify your path to compliance.

Compliance
Upcoming
On-demand
Security
Guide / Report
2022 State of Startup Security

Vanta asked startups to honestly and anonymously answer questions about their security posture, their security roadmap, and how satisfied they are with their security in general.

Compliance
Cybersecurity
Experts
Startups
Upcoming
On-demand
ISO 27001
Blog
SOC 2 and ISO 27001: Take advantage of common criteria mapping for compliance

When you use common criteria mapping for compliance, you can achieve multiple certifications without doing double the work. Streamline your SOC 2 and ISO 27001 goals with this helpful strategy.

Compliance
Cybersecurity
Features
Upcoming
On-demand
SOC 2
Blog
Who is responsible for SOC 2?

Who should be responsible for the work involved in SOC 2 attestation? Learn the differences between the technical and non-technical needs when preparing for SOC 2 compliance.

Compliance
Upcoming
On-demand
Security
Blog
How to set up your security to scale overseas

Is your business scaling overseas? Learn which certifications are required when expanding your business internationally and how to maintain security best practices.

Cybersecurity
Compliance
Upcoming
On-demand
CCPA
Blog
What is the CCPA and how will it affect your company?

Doing business in California? Learn about the CCPA and what it means for your company.

Compliance
Cybersecurity
Upcoming
On-demand
CCPA
Guide / Report
Your CCPA guide to data privacy compliance

What is CCPA compliance and how will it affect your business? Learn about California’s new regulations in this essential CCPA guide.

Cybersecurity
Compliance
Upcoming
On-demand
SOC 2
Blog
Why a SOC 2 is the most accepted security compliance standard

SOC 2 requirements make assurances necessary for compliance. Learn why customers, investors, partners, and even employees won’t have to fret over whether the right protections are in place with SOC 2 compliance.

Compliance
Cybersecurity
Upcoming
On-demand
No results found 🤷
Something went wrong. Please refresh the page and try again.
Oops! Something went wrong while submitting the form.