In simple terms, audit risk is an event when an audit misses something important. It happens when weaknesses, gaps, or fraud slip through and escape detection during an external or internal audit. And such events are undoubtedly real and painful. To elaborate, a small...
Author
ANUpam Saha
Audit Team Manager
Anupam Saha is an accomplished Audit Team Manager and Leader with strong expertise in implementing and managing compliance standards across diverse domains. He serves as an ISO 27001 Lead Auditor, leading organizations in building effective and resilient information security frameworks. Anupam specializes in guiding teams through structured audit processes, ensuring accuracy, consistency, and adherence to global standards. His leadership approach focuses on optimizing controls, strengthening governance, and enhancing overall security posture. With a strategic and detail-oriented mindset, he plays a key role in driving continual improvement and fostering a culture of security excellence.
Most Recent Articles
WHAT IS DATA AUDITING? WHY YOU NEED IT & HOW TO CONDUCT IT
Data is the most valuable asset of any business operating in the modern corporate landscape. But do they have a complete understanding of its collection, use, storage, and destruction? Most business owners will think for a moment before answering this question. We get...
SECURITY CONTROLS EXPLAINED: TYPES, FUNCTIONS & WHY THEY MATTER
Running a business in the current tech-driven, fast-paced world is not an easy task. And when it comes to threats and cyberattacks, the stakes are higher now than ever. So, as business owners, your focus should not be only on revenue building and scaling. In fact,...
HOW TO CONDUCT EFFECTIVE COMPLIANCE GAP ASSESSMENTS
Is your business fully compliant, with no gaps in its people, processes, or technologies? A single regulatory change can reveal your vulnerability and gap, which you might have ignored as a minor problem. Therefore, the true meaning of a compliant organization is to...
Why Data Mapping Matters for Compliance
Data-driven business models are the new normal of the modern-day business scenario. Without data, there is no business today. From growth-stage startups to large enterprises, data has become an inevitable asset in their key business operations. To put it simply, data...
HOW TO BUILD AN ASSET INVENTORY THAT SATISFIES ISO 27001, HIPAA, AND SOC 2
The primary objective of any business organization is to protect its assets. Failing to do so could cause serious problems and security incidents. For instance, imagine a healthcare startup failing to notice that an old server still has access to sensitive...
BUSINESS ASSOCIATE AGREEMENT (BAA) AND HIPAA: COMMON PITFALLS AND HOW TO AVOID THEM
The role of healthcare organizations in the current medical world is reaching new heights. Most of them handle sensitive patient data as a part of their daily business operations. The information helps them to provide swift delivery of healthcare services for the...
WHAT IS A CISO & WHY SHOULD YOU HAVE ONE?
Several trends are influencing the global businesses in the modern corporate world. One major trend among them is the growing importance of cybersecurity and regulatory conformance. In such a scenario, the role of a CISO in organizations has become inevitable....
CLOUD AUDITING INFRASTRUCTURE: BEST PRACTICES FOR COMPLIANCE PROFESSIONALS
In today’s corporate environment, businesses across various sectors are utilizing cloud computing services. This means that businesses have migrated from traditional physical servers to using modern cloud-based services. This service aids businesses in storing their...
QUALITY AUDITS: KEY FACTORS TO CONSIDER IN A SOC 2 AUDIT
The contemporary business environment is a period of major evolution. This evolution is marked by one common factor, which is the movement of organizations toward data-driven business models. Moreover, businesses of all sizes and natures now use data as an integral...









