William DePalma

William DePalma

William DePalma is a founding member of Compass IT Compliance, LLC. With nearly two decades of experience working alongside organizations to address IT security and compliance challenges, William has played a key role in helping businesses navigate evolving regulatory requirements and cybersecurity risks. His leadership has been instrumental in the growth of Compass IT Compliance, guiding organizations in strengthening their security postures and meeting industry standards. In addition to his work at Compass IT Compliance, William was instrumental in the founding of Compass Cyber Guard and the Compass Assurance Team, affiliates dedicated to providing specialized cybersecurity and compliance solutions. Before co-founding Compass IT Compliance, William worked with Lighthouse IT Compliance Group, where he was deeply involved in supporting organizations with their compliance initiatives. His experience spans a range of industries, giving him valuable insight into the operational and security challenges that companies face today. William holds a Bachelor of Science in Business Administration from the University of New Hampshire and served in the United States Coast Guard for 22 years. Learn more about William in his employee spotlight video: https://www.youtube.com/watch?v=97Ncw0JRt5A

Posts by William DePalma

Understanding SOC 2 Compliance & Vendor Management

SOC 2 Vendor Management

SOC 2 (System and Organization Controls 2) is a trusted auditing standard developed by the American Institute of Certified Public Accountants (AICPA). It assesses an organization’s information systems against the Trust Services Criteria (TSC): security, availability, processing integr …

Read Story

New York Implements Stricter Hospital Cybersecurity Regulations

New Hospital Cybersecurity Regulations

On October 2, 2024, New York State implemented groundbreaking cybersecurity regulations specifically targeting the state’s general hospitals. These regulations are a significant step forward in safeguarding sensitive patient data and healthcare operations, marking a notable shift in h …

Read Story

HECVAT vs. SOC 2: Find Out the Difference

HECVAT vs SOC 2

Organizations today, particularly those handling sensitive data or offering IT services, must respond to mounting calls for transparency on security and compliance procedures. Two such frameworks that fulfill this need are the Higher Education Community Vendor Assessment Toolkit (HECV …

Read Story

Data: The Secret Sauce to Surviving Business Disasters

Data Center

More than money, information is the lifeblood of any organization. From customer records to financial reports, the data your business generates and stores is integral to its day-to-day operations. However, many companies overlook a critical aspect of managing this valuable resource: u …

Read Story

How Long Is A SOC 2 Certification Good For?

SOC 2 Audit Calendar

SOC 2 (System and Organization Controls 2) reports provide service organizations with a way to demonstrate their commitment to security, availability, processing integrity, confidentiality, and privacy. These reports provide assurance to clients and stakeholders that the service organ …

Read Story

HITRUST Certification vs. SOC 2: A Simple Comparison

Hospital Worker on Computer

As organizations prioritize data security and privacy, they often seek out certifications and audits that demonstrate their methodology to protect sensitive information. Two frameworks in this context are HITRUST Certification (Health Information Trust Alliance) and SOC 2 (Service Org …

Read Story

Subscribe by email