Advisory

Blog generic 2

18 Aug: Advantages of Desktop as a Service

Desktop as a Service, or ‘DaaS’, represents computers that you access over a network and remotely control just like a normal computer. That network could be the internet or a company network. You can be hundreds of miles away from a desktop.

Cybersecurity in the Age of COVID-19

14 May: Cybersecurity in the Age of COVID-19

On Friday May 22nd, at 3 pm, Impact Maker’s Chris Tignor, CISO & Practice Lead of Cybersecurity & Risk Management, will be speaking in a panel discussion on Cybersecurity in the Age of COVID-19: Working from Home. Don’t miss this chance to learn what cybersecurity professionals are most concerned about in the Next Normal.

Blog generic 3

18 Mar: How to Be Successful with Remote Agile Delivery

We understand maintaining delivery agility when your workforce is running remote Agile is critical to your business success.

Unfortunately, circumstances both within and outside of our control often create the need for remote working arrangements. While operating Agile can be a wonderful experience, when quickly altered from physical co-location to remote Agile, there are some challenges that can impede team progress, individual performance, and the overall sense of belonging to a community.

CCPA California Consumer Privacy Act

06 Jan: CCPA Versus the Data-powered Internet: The now-active law is a burdensome yet necessary step in data privacy

Wednesday marked the beginning of a new decade, and perhaps the beginning of a new era in digital, as the California Consumer Privacy Act (CCPA) went into effect as law. While the CCPA’s statutes are overly burdensome for today’s data-powered Internet economy, the law is a necessary step in restoring balance of power and trust across Internet behemoths, consumers and legislators.

Decoding SOC Reporting Blog, People Summiting a Mountain

18 Oct: Leveraging SOC Reports

We have been discussing System and Organization Controls (SOC) reports and how they can be a used to establish and maintain trust between service providers and their customers.  In our first blog, we covered a basic understanding of the benefits of SOC reporting. In our second blog, we covered the various kinds and types of SOC reports as well as how they are used to support compliance requirements. In this blog, we will tackle one of the most important questions: What information is most important when reviewing a SOC report?

Demystifying SOC Reporting Blog Couple Climbing Mountain

18 Oct: Decoding SOC Reports

As noted in our earlier blog, System and Organization Controls (SOC) can be helpful tool in establishing and maintaining trust between service providers and their customers. Yet there are still a lot of questions around SOC reporting: Which SOC report is right for my organization?

Information Security Controls, SOC Reporting Blog, Group Climbing Mountain

18 Oct: Demystifying SOC Reports to Build Trust and Reduce Risk

The rise in cloud-based technology and third-party solutions increases both the complexity and uncertainty of security and compliance responsibilities. Service providers and their customers need to understand how responsibilities are shared and split. This includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), as well as operational solutions, such as credit card processing and billing, and IT, such as security monitoring and hosting services.

Karen Akens, Senior Consultant, Data Services

10 Oct: Spotlight on Women of Impact Makers: Karen Akens, Senior Consultant – Data Services

Here at Impact Makers, we like to shine a light on the incredible people we are lucky enough to call coworkers and friends. Today, we explore the life and career of our most recent “Employee of the Quarter” (2019 Q3), Karen Akens, who earned this distinction for her impressive involvement in our business development efforts across numerous active projects and pursuit teams.