CAPABILITIES

SOC Services

We help you become a better vendor.

In today’s connected business ecosystem, more and more organizations engage third parties to conduct key aspects of their operations. Because of the potential exposure, a growing number of firms view System and Organization Controls (SOC) reports as the price of admission for potential vendors.

At HORNE Cyber, we help you go beyond simply “checking all the boxes” and providing an unqualified report. We uncover opportunities to raise the bar on security, processes and practices. While our immediate focus is preparing you for or conducting your SOC report, our ultimate aim is to help you become a better vendor for your current customers and a more attractive choice for future ones.

Choosing the Right SOC Report for Your Organization

SOC reports provide management, auditors, business partners and executives with an objective analysis of your IT environment, and ensure them that transparency, accountability and controls are in place. For most organizations, the first challenge is defining the scope. HORNE helps you navigate the complexities and obtain the report that is appropriate for your needs.

SOC 1 Examinations:
Type 1 and Type 2

SOC 1 reports evaluate internal controls in relation to financial reporting. Service organizations may need a SOC 1 report if their provided service may have a material impact on the financial statements of the user entity, such as those that offer accounting software or payroll processing to user entities including loan servicing companies and medical claims processors.

SOC 2 Examinations:
Type 1 and Type 2

SOC 2 reports evaluate internal controls in relation to security, availability, processing integrity, confidentiality and privacy criteria. These typically are required of organizations that provide services that affect compliance and operational controls, such as data centers, server hosts and IT managed services providers.

SOC for
Cybersecurity

SOC for cybersecurity provides insights into your security posture and helps guide decisions that can drive board- or executive-level strategic cyber-resilience initiatives. This report demonstrates key strengths, vulnerabilities and opportunities of your IT environment, including:

  • Types of information and data at risk
  • Cybersecurity risk management program objectives
  • Factors that have a significant effect on inherent cybersecurity risks
  • Cybersecurity risk governance structure
  • Cybersecurity risk assessment processes
  • Monitoring of cybersecurity risk management program
  • Cybersecurity control processes

These reports help guide decision making and IT spending by outlining gaps in your organization’s cybersecurity risk management program.

The SOC Examination Process

While each SOC examination has its specific goals, the preparation is similar for all. Our SOC examination process includes:

b3lineicon|b3icon-head-idea||Head Idea
PLANNING

Identify your pain points, needs, wants, readiness and which SOC examination is appropriate for your organization.

b3lineicon|b3icon-list-add||List Add
PREPARATION

Address control gaps, collect documentation and establish controls to ensure preparedness for the SOC examination.

b3lineicon|b3icon-user-network||User Network
FIELDWORK

Collaborate with stakeholders to analyze the critical activities and controls that could affect users of your system.

b3lineicon|b3icon-signed-document||Signed Document
REPORTING & QC

Conduct quality control reviews to ensure that the work performed reflects the standards of the AICPA.

b3lineicon|b3icon-paper-plane||Paper Plane
DELIVERY

We release a finalized report to you for designated users, upon receipt of a signed Management Representation letter.

Our Insights:

SOC Services

What Should You Learn From Your Penetration Test?

Having a true advanced penetration test performed on your organization’s infrastructure is one of the fastest ways to gain valuable insight on the...

READ MORE

SSAE 18 and Your Company’s SOC 1 Audit

In 2016, the Accounting Standards Board (ASB) of the AICPA looked at its attestation standards and said, “We need to do some clarifying.” Out of...

READ MORE

FFIEC Joint Statement on Cybersecurity – Key Takeaways

This past week the FFIEC issued a statement advising financial institutions to actively manage the risks associated with interbank messaging and...

READ MORE

SOC for Cybersecurity: What Does this Mean for Your Business?

The American Institute of Certified Public Accountants (AICPA) finalized the guidance for Systems and Organization Controls (SOC) for Cybersecurity...

READ MORE

Breaking Bank: Episode 1

I don’t know about you, but I’ve read a lot of content-filled, factually intense cybersecurity articles over the past few months. I’ve read so...

READ MORE

Breaking Bank: Episode 3

Over the last several weeks we have witnessed the story of a Bank who thought that compliance was enough to keep their customer’s information and...

READ MORE

READ OUR LATEST INSIGHTS

STAY SAFE. STAY INFORMED.
SIGN UP FOR CYBERSECURITY UPDATES.

SOC Services
Experts

HORNE Cyber can help your organization communicate the effectiveness of its security program and build trust through transparency with an SOC examination.

MEET THE TEAM    

CMMC Readiness Assessment

The Department of Defense created Cybersecurity Maturity Model Certification (CMMC) to provide a standardized set of controls to protect sensitive information and the vital flow of supplies.


READ MORE

Talk to an expert today.