- What is your process of Cybersecurity governance and identification of cybersecurity risks?
- How do you protect firm networks and client/customer information and data?
- How do you detect unauthorized activity in your network?
- What is your process for incident response in the event of a cybersecurity breach?
- Is the firm SOC 2 certified? If so, can you provide the latest certification documentation?
- Cybersecurity due diligence question
- Openshift Online
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.