SG-logo-white
  • Product
    • The Platform

      Design a security program that builds trust, scales with your business, mitigates risk, and empowers your team to work efficiently.

      • Our technology
      • Built for AI
      • Why Strike Graph
      • All frameworks
    • Features
      • AI Security Assistant
      • Audits & certifications
      • Customizations
      • Dashboards & reporting
      • Enterprise content
      • Integrations
      • Pen testing
      • Risk management
      • SBOM Manager
      • Security questionnaires
      • Vulnerability scanning
      • Verify AI
  • Solutions
    • Solutions
      For industries
      • Data Centers
      • Life Sciences
      • Manufacturing
      • Medical Devices
    • Frameworks
      • CCPA/CPRA
      • CMMC
      • DORA
      • GDPR
      • HIPAA
      • SOC 2
      • HIPAA
      • ISO 27001
      • All frameworks
      • HITRUST CSF
      • ISO 27001
      • ISO 27701
      • ISO 42001
      • NIST CSF
      • NIST 800-53
      • NIST 800-171
      • PCI DSS
      • SOC 1
      • SOC 2
      • TISAX
      • All frameworks
  • Pricing
  • Company
    • Strike Graph
      • About us
      • Careers
      • News
      • Partner
      • Press
    • FEATURED

      Cybersecurity is evolving — Strike Graph is leading the way.

      Screen Shot 2023-02-09 at 2.57.5-min (1)
      February 9, 2023
      Security Compliance: Why It’s A Business Accelerator
    • Thought leadership
      It’s your technology and your security controls: Don’t let an auditor become your CTO
      Cybersecurity compliance that is unique to your organization
      Constant compliance is security theater
  • Resources
    • categories
      • Blog
      • Case studies
      • E-books
      • Guides
      • Secure Path events
      • Secure Talk podcast
      • Webinars
      • All resources
    • Ebook

      Check out our newest resources.

      Learn how to get certified the smarter way.
      Learn how to get certified the smarter way.
      Download our free ebook
    • SEARCH

      Find answers to all your questions about security, compliance, and certification.

    • Sign In
    • Schedule a demo
    • Sign In
    • Schedule a demo

    Ready to see Strike Graph in action?

    Find out why Strike Graph is the right choice for your organization. What can you expect?

    • Brief conversation to discuss your compliance goals and how your team currently tracks security operations
    • Live demo of our platform, tailored to the way you work
    • All your questions answered to make sure you have all the information you need
    • No commitment whatsoever

    We look forward to helping you with your compliance needs!

    Fields marked with a star (*) are required

    By submitting this form, you agree to receive promotional messages from Strike Graph about its products and services. You can unsubscribe at any time by clicking on the link at the bottom of our emails.

    Find out why Strike Graph is the right choice for your organization. What can you expect?

    • Brief conversation to discuss your compliance goals and how your team currently tracks security operations
    • Live demo of our platform, tailored to the way you work
    • All your questions answered to make sure you have all the information you need
    • No commitment whatsoever

    We look forward to helping you with your compliance needs!

      • Home >
      • Resources >
      • Authors >
      • Stephen Ferrell, CISA, CRISC

      Stephen Ferrell, CISA, CRISC

      Stephen Ferrell, CISA, CRISC
      Strike Graph
      Connect on LinkedIn Connect on LinkedIn

      Resources from Stephen Ferrell, CISA, CRISC

      CMMC 2.0 Level 3 Simplified: Steps, Controls and Checklist
      BLOG

      CMMC 2.0 Level 3 Simplified: Steps, Controls and Checklist

      Experts break down CMMC 2.0 Level 3 for defense contractors with tips to streamline compliance. Download a free list of controls and a task checklist.
      April 16, 2025
      CMMC, Measuring/certifying security programs
      Simplifying CMMC audits: step-by-step preparation, best practices and checklist
      BLOG

      Simplifying CMMC audits: step-by-step preparation, best practices and checklist

      Compliance experts break down CMMC audit types and share step-by-step prep. See cost and time estimates. Download a free CMMC Audit Task Checklist.
      March 13, 2025
      CMMC, Measuring/certifying security programs, Operating security programs, Designing security programs
      Simplifying TISAX Audits: Types, Steps, Streamlining Strategies and Checklist
      BLOG

      Simplifying TISAX Audits: Types, Steps, Streamlining Strategies and Checklist

      Experts explain the types and objectives of TISAX audits. Tips on preparing for the audit, passing & earning a TISAX label. Download Free Audit Checklist.
      March 11, 2025
      TISAX, Security compliance, Measuring/certifying security programs, Designing security programs
      CMMC 2.0 Level 2 Simplified: Requirements, Steps, Controls List and Checklist
      BLOG

      CMMC 2.0 Level 2 Simplified: Requirements, Steps, Controls List and Checklist

      Experts explain the new CMMC 2.0 Level 2 framework for defense contractors step by step. Download a free Level 2 security control list & CMMC Level 2 checklist.
      February 07, 2025
      CMMC, Measuring/certifying security programs
      What You Need to Know About CMMC in 2025
      BLOG

      What You Need to Know About CMMC in 2025

      Learn the ins and outs of CMMC 2.0 compliance and how it impacts your business.
      October 24, 2024
      CMMC, Security compliance, Designing security programs
      Beyond SBOMs: Building a secure future for medical devices
      BLOG

      Beyond SBOMs: Building a secure future for medical devices

      The FDA's SBOM mandate is a positive step, but companies should need to implement a comprehensive cybersecurity framework to fully protect devices, users, and ultimately, patient safety.
      August 26, 2024
      PCI DSS, Security compliance, Designing security programs
      Lessons from the CrowdStrike outage: Why verification is the missing piece in modern security automation
      BLOG

      Lessons from the CrowdStrike outage: Why verification is the missing piece in modern security automation

      Wondering which security frameworks might be helpful for your organization? Read on to learn about some of most common standards and certifications.
      July 24, 2024
      Security compliance, Operating security programs
      TISAX Levels Simplified: Differences, Preparations & Checklists
      BLOG

      TISAX Levels Simplified: Differences, Preparations & Checklists

      TISAX experts compare the 3 assessment levels and detail how to reach compliance for each. Explore time and costs. Download Free TISAX Preparation Checklist.
      May 26, 2023
      TISAX, Security compliance, Designing security programs
      TISAX vs. ISO 27001: Similarities, Differences, Mappings & Streamlining
      BLOG

      TISAX vs. ISO 27001: Similarities, Differences, Mappings & Streamlining

      Compliance experts explain TISAX vs ISO 27001. Learn similarities & differences and when to get one or both certifications. Free mapping of controls & evidence.
      May 17, 2023
      TISAX, ISO 27701, Security compliance, Designing security programs
      ISO vs. GDPR Compliance: Similarities, Differences, Mappings & Streamlining
      BLOG

      ISO vs. GDPR Compliance: Similarities, Differences, Mappings & Streamlining

      Experts explain the differences & similarities between GDPR, ISO 27001:2022 and ISO 27701. Download free mapping of controls & evidence. Learn when to combine.
      August 18, 2022
      ISO 27001, GDPR, ISO 27701, Security compliance, Measuring/certifying security programs, Operating security programs, Designing security programs
      Load More items
      See all resources

      Keep up to date with Strike Graph.

      The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.

      foot-dark-shade
      SG-logo-white

      Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.

      Frameworks

      • CMMC
      • GDPR
      • HIPAA
      • ISO 27001
      • PCI DSS
      • SOC 2
      • TISAX
      • All frameworks

      Design

      • Security frameworks
      • Risk Management
      • Customizations

      Operate

      • Verify AI
      • AI Security Assistant
      • Integrations
      • Security questionnaires

      MEASURE

      • Audits & certifications
      • Pen testing
      • Dashboards & reporting

      Learn more

      • Resources
      • Product Support Center
      • News
      • Press
      • Pricing
      • Partner
      • About us
      • Careers
      • Contact us
        • Sign in
        • Schedule a demo
        SOC_NonCPAA
        • 🦆 icon _rounded linkedin_
        • 🦆 icon _rounded facebook_
        • 🦆 icon _rounded twitterbird_
        • Subtract

        © 2025 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act

        foot-dark-shade
        SG-logo-white
        Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
        • Contact Us
        • Resources
        • Product Support
        • Start for Free
        • Schedule a demo
        • Sign In
        • 🦆 icon _rounded linkedin_
        • 🦆 icon _rounded facebook_
        • 🦆 icon _rounded twitterbird_
        • Website images - Subtract

        © 2025 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act

        SOC_NonCPAA
        Achieved-SG-badge_hipaa

        Ready to see Strike Graph in action?

        Fill out a simple form and our team will be in touch.

        Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.

        What to expect:

        • Lorem Ipsum is simply dummy text of the printing and typesetting industry.
        • Lorem Ipsum is simply dummy text of the printing.
        • It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.
        • The standard chunk of Lorem Ipsum used since the 1500s

        We look forward to helping you with your compliance needs!

        Fields marked with a star (*) are required

        Fill out a simple form and our team will be in touch.

        Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.

        What to expect:

        • Lorem Ipsum is simply dummy text of the printing and typesetting industry.
        • Lorem Ipsum is simply dummy text of the printing.
        • It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.
        • The standard chunk of Lorem Ipsum used since the 1500s

        We look forward to helping you with your compliance needs!