SIGN-IN

BLOG

Michelle Strickler

Michelle Strickler
Michelle is a passionate advocate for a risk-based approach to IT compliance, as well as for an increased role of effective IT governance. Before joining Strike Graph, she coached companies, from startups to public enterprises, through their compliance initiatives. In a past life, she was an IT Auditor, but don't hold that against her.

Recent Posts

How Long Does it Take to Get a SOC 2?

A big sale is on the line. Your customer requires that you achieve a SOC 2 Type 2 certification before they will sign the contract for your service....
Learn More

Choosing the Right Trust Services Criteria for Your SOC 2

For organizations beginning their SOC 2 journey, figuring out which of the five Trust Services Criteria (TSC) to include in their scope can seem like...
Learn More

What (the bleep) is a Control?

A lot of lingo gets tossed around in the compliance world: Criteria, Standard, Point of Focus, Narrative, Control Owner, Test of Operating...
Learn More

5 Things Founders Should Know About a SOC 2

If you are like us, you wish you had a SOC 2 Fairy Godmother to guide you through the convoluted SOC 2 compliance process. We have something better:...
Learn More

How to use Your Pre-Audit Cyber Security Program to Drive Sales

There is a stretch of time in your organization’s SOC 2 journey where security practices are being established or refined. Sometimes they are being...
Learn More

System Description Series: Adding Additional TSCs

Weaving Privacy into Your System Description We are often asked how to best weave the Privacy, Confidentiality, Availability and Processing Integrity...
Learn More

SUSCRIBE FOR MORE NEWS