BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//databrackets - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://databrackets.com
X-WR-CALDESC:Events for databrackets
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T110000
DTEND;TZID=America/New_York:20221207T120000
DTSTAMP:20260416T020510
CREATED:20221107T074101Z
LAST-MODIFIED:20231130T063837Z
UID:51656-1670410800-1670414400@databrackets.com
SUMMARY:How to Implement the Latest ISO 27001 Updates
DESCRIPTION:More and more organizations have been interested in getting ISO 27001 certified in order to assure their customers that they are able to protect customer data. An ISO 27001 certification has also become a basic requirement for a growing number of B2B contracts. This trend has been increasing globally since organizations also benefit from the high level of security and good cyber hygiene. \nTo get this critical advantage\, join us for a live webinar about the recent changes to ISO 27001 controls and learn how you can get or stay certified. Organizations who are starting from scratch and those who have been certified as per ISO 27001:2013 standards\, will learn about the readiness journey that includes the recent changes and the certification/recertification process. \n  \nDay & Date: Wednesday – December 7\, 2022 \nTime: 11:00 am – 12:00 pm ET \n 
URL:https://databrackets.com/event/how-to-implement-the-latest-iso-27001-updates/
LOCATION:Virtual
CATEGORIES:Webinars
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221116T140000
DTEND;TZID=America/New_York:20221116T144500
DTSTAMP:20260416T020510
CREATED:20221027T052808Z
LAST-MODIFIED:20231205T085929Z
UID:51469-1668607200-1668609900@databrackets.com
SUMMARY:Prepare for CMMC 2.0
DESCRIPTION:Suppliers who plan to work with the Department of Defense (DoD) need to comply with CMMC 2.0 controls. This new standard will become applicable in a matter of months and has significant differences compared to its predecessor CMMC 1.0. On your journey to ensuring your systems are compliant with the new set of controls\, you need to be aware of critical factors that can expedite or impede your progress. \nJoin us as we dive deep into the following content with our guest speaker – Greg Manson\, and empower you to successfully navigate the landscape. \n1. Overview of CMMC 2.0\n2. Understanding the roles involved in certification (RPO and C3PAO)\n3. CMMC Updates\n4. Timeline to comply with CMMC 2.0\n5. Implementation roadmap\n6. Tips for Successful CMMC Implementation \nAbout our Guest Speaker: Greg Manson \nGreg is an ISACA Certified Information Systems Auditor (CISA) and a Certified Data Privacy Solutions Engineer (CDPSE). He is a CMMC Registered Practitioner (RP) allowing Tego to become a CMMC Registered Provider Organization (RPO) and positioning the company to assist their customers in the Defense Industrial Base (DIB) navigate the strict requirements of the Defense Acquisition Regulations Supplement (DFARS). \nDay and Date: Wednesday Nov 16\, 2022 \nTime: 2:00 pm – 2:45 pm EST \n 
URL:https://databrackets.com/event/prepare-for-cmmc-2-0/
LOCATION:Virtual
CATEGORIES:Webinars
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T130000
DTEND;TZID=America/New_York:20221012T134500
DTSTAMP:20260416T020510
CREATED:20221003T053721Z
LAST-MODIFIED:20221026T134424Z
UID:51266-1665579600-1665582300@databrackets.com
SUMMARY:Security Risk Analysis for MIPS MACRA
DESCRIPTION:One of the eligibility criteria for MIPS is to confirm that patient data is being managed securely. To prove this\, your practice needs to undergo a security risk analysis (we call it the annual tech physical!) to identify technical vulnerabilities in the way electronic Protected Health Information (ePHI) is managed by your eHR system. In this webinar\, we will help you understand what is a Security Risk Analysis for MIPS MACRA and how you can partner with a security vendor to get the support you need. \nJoin our certified security experts\, ask/email your questions & be empowered to complete your attestation in time for 2022! \nDay & Date: Wednesday 12th Oct\, 2022 \nTime: 1:00 – 1:45 pm EST \n* If you’re unable to attend\, you can reserve your seat to receive the recording. \n 
URL:https://databrackets.com/event/security-risk-analysis-for-mips-macra/
LOCATION:Virtual
CATEGORIES:Webinars
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220929T130000
DTEND;TZID=America/New_York:20220929T134500
DTSTAMP:20260416T020510
CREATED:20220905T043434Z
LAST-MODIFIED:20221003T052753Z
UID:50802-1664456400-1664459100@databrackets.com
SUMMARY:Business Continuity and Disaster Recovery Planning for Healthcare Organizations
DESCRIPTION:It is vital for healthcare organizations to continue to operate even when they encounter disasters. These include but are not limited to ransomware attacks\, software malfunctions\, extreme weather incidents and disturbance to essential services like electricity\, internet\, etc. Terrorist attacks add to this uncertainty and make it difficult to ensure that crucial systems are available. \ndatabrackets has been at the forefront of supporting Business Continuity and Disaster Recovery Planning for Healthcare Organizations. Join our certified security experts as we share insights and best practices to ensure your organization is prepared to succeed in the face of adversity. \nDate & Day: Thursday\, 29th September\, 2022\nTime: 1:00pm EST \n* If you’re unable to attend\, you can reserve your seat to receive the recording. \n  \n \n 
URL:https://databrackets.com/event/business-continuity-and-disaster-recovery-planning-for-healthcare-organizations/
LOCATION:Virtual
CATEGORIES:Webinars
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220728T130000
DTEND;TZID=America/New_York:20220728T134500
DTSTAMP:20260416T020510
CREATED:20220722T055039Z
LAST-MODIFIED:20220829T061904Z
UID:50242-1659013200-1659015900@databrackets.com
SUMMARY:Telehealth and HIPAA
DESCRIPTION:Telehealth Solutions have been a panacea during the pandemic. They provided patients and healthcare professionals the much-needed flexibility of receiving medical care without risking exposure to Covid-19 or commuting while coping with infection. In this webinar\, databrackets will shed light on HIPAA Compliance and how it applies to telehealth solutions. Our guest speaker\, Jit Chawla\, will showcase the challenges faced by telehealth providers and discuss his journey while building Ace Health Solutions. \nJoin us for a live webinar and discover solutions to managing ePHI (Electronic Protected Health Information) in these unprecedented times. \n  \n \n 
URL:https://databrackets.com/event/telehealth-and-hipaa/
LOCATION:Virtual
CATEGORIES:Webinars
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220512T130000
DTEND;TZID=America/New_York:20220512T140000
DTSTAMP:20260416T020510
CREATED:20220502T152736Z
LAST-MODIFIED:20220516T141113Z
UID:48853-1652360400-1652364000@databrackets.com
SUMMARY:How to Succeed at SOC 2
DESCRIPTION:Organizations zealously pursue their SOC 2 Certification in order to impress prospective clients and sign more deals since it proves their commitment to information security. It is a highly respected credential and is vital while showcasing the efficacy of an organization’ data security policies and procedures. However\, the journey to becoming SOC 2 compliant and getting certified can be relatively smooth or fraught with obstacles. \nJoin us for a live webinar with Mr. Ben Hunter\, CISO\, Advisory Services Principal\, CPA/CITP\, CISA\, CRISC\, CDPSE\, CISM at Bernard Robinson and Company and uncover valuable insights to help you Succeed at SOC 2!
URL:https://databrackets.com/event/how-to-succeed-at-soc-2/
LOCATION:Virtual
CATEGORIES:Webinars
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220113T130000
DTEND;TZID=America/New_York:20220113T134500
DTSTAMP:20260416T020510
CREATED:20220105T154147Z
LAST-MODIFIED:20220205T092647Z
UID:2596-1642078800-1642081500@databrackets.com
SUMMARY:Cybersecurity for Radiologists and Allied Businesses
DESCRIPTION:Explore the terrain of data breaches in Medical Imaging Technology\, DICOM\, PACS\, VNA\, RIS\, Telehealth\, AI-based imaging technology and Healthcare SaaS. This webinar is designed for professionals working in the field of Radiology and allied businesses. It will highlight the sources of a breach\, ways to prevent a data breach and avoid the loss of reputation and revenue. Empowered with this information\, businesses will be able to strengthen their security posture\, adopt a ‘Patient First’ approach and prevent getting penalized for a preventable breach. \ndatabrackets has been at the forefront of supporting businesses to comply with HIPAA / HITECH\, ISO and other compliance certifications for over a decade. Join our compliance and cybersecurity expert for a free live webinar at 1pm on January 13\, 2022. \n \n 
URL:https://databrackets.com/event/cybersecurity-for-radiologists-and-allied-businesses/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Cybersecurity-for-Radiologists-event.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211209T130000
DTEND;TZID=America/New_York:20211209T134500
DTSTAMP:20260416T020510
CREATED:20211119T092109Z
LAST-MODIFIED:20220205T092353Z
UID:46880-1639054800-1639057500@databrackets.com
SUMMARY:What is CMMC Version 2 (Cybersecurity Maturity Model Certification)
DESCRIPTION:Are you interested in working with the Department of Defense (DoD)? In this webinar\, our guest speaker – Greg Manson\, will discuss the CMMC Version 2 certification which will become a prerequisite to work with the DoD\, outline the differences from CMMC Version 1 and share overlaps with the NIST framework\, which was being used. We will share the timelines to work towards this certification\, finer details of each stage and share the insights of a registered practitioner. \n  \nAbout CMMC\nThe CMMC (Cybersecurity Maturity Model Certification) Version 2 is the Department of Defense‘s (DoD) new certification method for evaluating contracted firms’ Cybersecurity environments. This certification validates that contractors have in place appropriate cybersecurity controls and policies to fulfill military security standards. Companies may self-certify their compliance under the relevant Defense Federal Acquisition Regulations (DFARS)\, based on NIST standards\, prior to the CMMC. \nThe DoD aims to accomplish the following through the CMMC: \n• Verify that contractors have robust procedures to safeguard the DIB’s network and systems from existing and future cyber threats. \n• Provide confidence by demanding independent third-party validation \n• Establish compliance levels aligns with the different degrees of risk \n• Encourage increased security at a sustainable cost to the federal government \nAbout The Presenter: Greg Manson \nGreg is an ISACA Certified Information Systems Auditor (CISA) and a Certified Data Privacy Solutions Engineer (CDPSE). He recently became a CMMC-AB Registered Practitioner allowing Tego to become a CMMC-AB Registered Provider Organization positioning the company to assist their customers in the Defense Industrial Base navigate the strict requirements of the Defense Acquisition Regulations Supplement (DFARS). \n \n 
URL:https://databrackets.com/event/webinar-what-is-cmmc-version-2-cybersecurity-maturity-model-certification/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/CMMC-Version-2-event.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211014T130000
DTEND;TZID=America/New_York:20211014T134500
DTSTAMP:20260416T020510
CREATED:20210930T081500Z
LAST-MODIFIED:20220205T091911Z
UID:46875-1634216400-1634219100@databrackets.com
SUMMARY:Cybersecurity for Healthcare
DESCRIPTION:With increased migration to the cloud coupled with rising usage of connected devices\, the cyber attack surface has broadened in healthcare organizations. Healthcare data breach costs are highest as per IBM’s Cost of Data Breach Report\, 2021. A single vulnerable asset can provide a threat actor access to sensitive patient data and medical services. \nJoin the cyber security experts at databrackets and learn how our cybersecurity tools can help you mitigate your risks. The primary focus of the webinar will be on Vulnerability Assessment and Penetration Testing (VAPT). \n \n 
URL:https://databrackets.com/event/cybersecurity-for-healthcare/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Cybersecurity-for-Healthcare-event.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210916T130000
DTEND;TZID=America/New_York:20210916T140000
DTSTAMP:20260416T020510
CREATED:20210913T080949Z
LAST-MODIFIED:20220205T091412Z
UID:46871-1631797200-1631800800@databrackets.com
SUMMARY:Cloud Security Best Practices
DESCRIPTION:Many organizations are moving their applications and data to the cloud rather than incurring the costs of purchasing hardware and running/maintaining on-premises applications. Likewise\, other organizations manage their data in on-premises systems but store their backups in the cloud. Regardless of which approach your organization chooses\, you may still have many questions about cloud-based security. Is the cloud secure enough? Is your data safe? Is your data protected? \nAttend our 45-minute webinar to learn more about Cloud Security Best Practices. \n \n 
URL:https://databrackets.com/event/cloud-security-best-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Cloud-Security-event.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210907T030000
DTEND;TZID=America/New_York:20210907T154500
DTSTAMP:20260416T020510
CREATED:20210812T074756Z
LAST-MODIFIED:20220205T091518Z
UID:46867-1630983600-1631029500@databrackets.com
SUMMARY:Cybersecurity & Data Protection in the Middle-East
DESCRIPTION:Cybersecurity is regarded as one of the most significant risks to which firms in the Middle East are exposed. More specifically\, in Saudi Arabia\, Cybersecurity is considered a serious concern due to the country’s massive use of modern technology across businesses. \nThe Saudi Arabian Monetary Authority (SAMA)\, the country’s central bank\, created the SAMA-Cyber Security Framework (CSF) to defend against the rising cyber dangers. \nIn this interactive webinar session\, we will cover: \n• Cybersecurity Strategic Approach\n• SAMA Cyber Security Framework (CSF) Overview & Best Practices Implementation\n• databrackets’ Cybersecurity Compliance Platform for SAMA\n• Tips to prevent potential cyber-attacks \nRegister for our free 45-minute live webinar to understand ways and means to secure data\, enhance your security posture\, and comply with SAMA CSF. \nClick here to Download the document on SAMA Cyber Security Framework and the Best Practices \n \n 
URL:https://databrackets.com/event/cybersecurity-data-protection-in-the-middle-east/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/security-2910624_1280.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201217T130000
DTEND;TZID=America/New_York:20201217T140000
DTSTAMP:20260416T020510
CREATED:20200903T063105Z
LAST-MODIFIED:20220210T073355Z
UID:47015-1608210000-1608213600@databrackets.com
SUMMARY:Third-party Vendor Risk Assessments
DESCRIPTION:While outsourcing to third party vendors has great benefits including cost efficiency\, time-to-market\, and scalability\, it can introduce additional risks to the information if data isn’t properly managed. Vendor exposure is considered as one of the key vulnerabilities in organizations’ risk assessment. Several organizations are leveraging third-party risk assessment methodologies for reviewing their vendors’ risks including Shared Assessments\, CSA\, NIST 800-171\, etc. \nJoin our 45min webinar to  learn more about different vendor assessment standards and how you can leverage automated vendor assessment workflow to improve your process efficiencies. \n 
URL:https://databrackets.com/event/third-party-vendor-risk-assessments/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Risk-analysis-consulting-pricing.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201210T130000
DTEND;TZID=America/New_York:20201210T140000
DTSTAMP:20260416T020510
CREATED:20200602T062738Z
LAST-MODIFIED:20220210T073100Z
UID:47011-1607605200-1607608800@databrackets.com
SUMMARY:Overview of NIST 800-53 Audit
DESCRIPTION:NIST 800-53 Guidelines consist of standards\, guidelines\, and best practices to manage information-related risks.  NIST 800-53 is being used by a wide range of businesses and organizations and helps shift organizations to be proactive about risk management. Revision 5 was announced and made publicly available recently. The changes include guidance on how to perform self-assessments\, additional detail on supply chain risk management\, and guidance on how to interact with supply chain stakeholders. \nAttend our free\, live 45-minute webinar to learn about how 800-53 assessments can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/nist-800-53-audit/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201029T130000
DTEND;TZID=America/New_York:20201029T140000
DTSTAMP:20260416T020510
CREATED:20201008T062124Z
LAST-MODIFIED:20220210T072703Z
UID:47008-1603976400-1603980000@databrackets.com
SUMMARY:NIST 800-171 Compliance Overview
DESCRIPTION:NIST SP 800-171 standards refers to National Institute of Standards and Technology Special Publication 800-171\, which governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. It is essentially a set of NIST standards that define how to safeguard and distribute material deemed sensitive but not classified. NIST 800-171 compliance is being used by a wide range of businesses and organizations to be proactive about risk management.  \nAttend our free\, live 45-minute webinar to learn about how NUST 800-171 compliance assessments can help your organization to improve your security posture and comply with your customer security requirements. \n 
URL:https://databrackets.com/event/nist-sp-800-171-compliance-overview/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T130000
DTEND;TZID=America/New_York:20201008T140000
DTSTAMP:20260416T020510
CREATED:20200917T061520Z
LAST-MODIFIED:20220210T072055Z
UID:47005-1602162000-1602165600@databrackets.com
SUMMARY:How to value your practice?
DESCRIPTION:The value of a medical practice impacts every aspect of the professional\, financial\, and personal life of a doctor and his family. Valuation exercise starts by asking some of the key questions: \n– How fair market value of the business is calculated? \n– What are the strategic and operational factors which impact business value? \n– What is the value of your business to a “strategic buyer” (e.g. value of a physician practice for a hospital)? \nJoin us for a free live 45-minutes webinar to learn more on how to value your practice. \n \n 
URL:https://databrackets.com/event/how-to-value-your-practice/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/money-doctor-M3EC68X.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200805T130000
DTEND;TZID=America/New_York:20200805T140000
DTSTAMP:20260416T020510
CREATED:20200722T061142Z
LAST-MODIFIED:20220210T071515Z
UID:47001-1596632400-1596636000@databrackets.com
SUMMARY:Become a databrackets’ Partner to Offer Compliance and Cybersecurity Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Cybersecurity\, Compliance and Certification Services\nApart from frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology services industry.  We are extending our tested and tried assessment and compliance platform to IT\, legal\, CPA\, and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities\, and steps to become a databrackets’ partner. Visit our partnership page to understand more. We have several testimonials from our partners who have expanded their services and revenue to include compliance and cybersecurity assessment services using our online platform. \n  \nSuggested Audience:\n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members\n\n 
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200723T130000
DTEND;TZID=America/New_York:20200723T140000
DTSTAMP:20260416T020510
CREATED:20200629T060855Z
LAST-MODIFIED:20220210T071134Z
UID:46997-1595509200-1595512800@databrackets.com
SUMMARY:Backup and Disaster Recovery – Best Practices to Defeat Ransomware
DESCRIPTION:Business continuity and disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for backup\, disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for disaster recovery and how to plan for business continuity. \n \n 
URL:https://databrackets.com/event/backup-and-disaster-recovery-best-practices-to-defeat-ransomware/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Ransomware.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200709T130000
DTEND;TZID=America/New_York:20200709T140000
DTSTAMP:20260416T020510
CREATED:20200624T055802Z
LAST-MODIFIED:20220210T070821Z
UID:46992-1594299600-1594303200@databrackets.com
SUMMARY:DevOps Security Best Practices
DESCRIPTION:The DevOps approach gives security practitioners and testers an opportunity to integrate security in the very early stages of software development and deployment process. While it’s clear that security should be ingrained throughout the entire DevOps lifecycle\, learn some of the best practices in the evolving practice for securing your DevOps shop. \nLearn more by attending our free live 45-minute webinar on best practices for securing DevOps. \n 
URL:https://databrackets.com/event/devops-security-best-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Pen-test1.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200604T110000
DTEND;TZID=America/New_York:20200604T120000
DTSTAMP:20260416T020510
CREATED:20200522T055208Z
LAST-MODIFIED:20220210T065651Z
UID:46988-1591268400-1591272000@databrackets.com
SUMMARY:Introduction to Yoga for Work from Home Professionals
DESCRIPTION:We are switching gears a bit this time around and introducing yoga and mindfulness for all our audience. As we all know\, millions of people across the world are working from home right now. Most people are surprised by the stress they feel once the novelty of working from home wears off\, and the stress of its challenges becomes more apparent. We will be sharing a few tips and tricks on how to stay energized while working from home with an introduction to Yoga\,  the eight limbs of yoga\, and simple breathing techniques. We are excited to have Yogacharya Amit Chatterjee join us  on this most important topic. \n \n 
URL:https://databrackets.com/event/yoga-techniques-for-work-from-home-professionals/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/wfh-yoga.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200528T130000
DTEND;TZID=America/New_York:20200528T140000
DTSTAMP:20260416T020510
CREATED:20200506T054601Z
LAST-MODIFIED:20220210T065203Z
UID:46984-1590670800-1590674400@databrackets.com
SUMMARY:Best Practices and Trends in Remote Working Technologies for Small/Medium Businesses
DESCRIPTION:Join this webinar with our friends from WorkSmart IT\, a top NC Managed IT Service Provider for small businesses and nonprofits\, for a discussion on the changing landscape of every-day business technology for remote office environments. You’ll hear about technology trends and solutions that will help keep your teams productive and collaborative; as well as factors that you should be considering to protect your business from the addition cybersecurity threats that occur as teams work remotely. \n \n 
URL:https://databrackets.com/event/best-practices-and-trends-in-remote-working-technologies-for-small-medium-businesses/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/young-mother-working-from-home.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T130000
DTEND;TZID=America/New_York:20200326T134500
DTSTAMP:20260416T020510
CREATED:20200207T062521Z
LAST-MODIFIED:20220210T062926Z
UID:46969-1585227600-1585230300@databrackets.com
SUMMARY:Security Hardening for AWS Cloud Hosting
DESCRIPTION:If you use a cloud-based service such as Amazon Web Services\, Amazon must agree to a written agreement to adhere to certain security and privacy compliance provisions set out in regulatory compliance requirements like HIPAA/HITECH\, GDPR\, CCPA\, etc. Apart from the written agreements from AWS\, AWS security hardening is required for most companies and other organizations that store sensitive data on the cloud as AWS only provides features to help harden the environment. Customers are responsible for ensuring their particular use of AWS complies with HIPAA\, the HITECH Act\, and other applicable state laws and regulations. \nJoin our webinar to learn how to assist organizations interested in hardening AWS services and to understand the relevant capabilities of Amazon AWS. \nIntended Audience: Privacy Officers\, Security Officers\, Compliance Officers\, and Business Associates responsible for HIPAA and HITECH Act implementation and compliance.
URL:https://databrackets.com/event/security-hardening-for-aws-cloud-hosting/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/icon-cloud-AWS-26-mar.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200305T130000
DTEND;TZID=America/New_York:20200305T134500
DTSTAMP:20260416T020510
CREATED:20200124T061910Z
LAST-MODIFIED:20220210T062414Z
UID:46967-1583413200-1583415900@databrackets.com
SUMMARY:System and Organization Controls: SOC Suite of Certifications
DESCRIPTION:Companies in a wide range of industries face growing market pressure to increase their competitive edge and prove the quality of their controls. A SOC (System and Organization Controls) report (formerly SAS 70) demonstrates to your clients a commitment to internal controls by providing third-party attestation to the reliability of the design\, implementation\, and operating effectiveness of your organization’s controls. An additional benefit of a SOC report is a reduced impact on your internal resources by minimizing the need for external audits. \nJoin our 45-minute webinar to learn more about the increasingly popular SOC 2 certification. \n  \nSuggested Audience: \n– SaaS Providers\n– IT Managers\n– Product Vendors\n– Managed IT service companies\n– Service Providers
URL:https://databrackets.com/event/system-and-organization-controls-soc-suite-of-certifications/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/soc-mar-5.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200206T130000
DTEND;TZID=America/New_York:20200206T134500
DTSTAMP:20260416T020510
CREATED:20200123T061327Z
LAST-MODIFIED:20220210T083146Z
UID:46961-1580994000-1580996700@databrackets.com
SUMMARY:Virtual security\, compliance\, and data protection officers for small to medium-sized organizations
DESCRIPTION:Small to medium-sized firms are struggling to find security/compliance officers that are required by law and cybersecurity challenges. Virtual officers appear to be the obvious solution to companies that cannot find a qualified professional due to cost\, tight labor market and ever-changing landscape of the industry. Sophisticated cyber attacks\, GDPR\, CCPA\, NY Cybersecurity Regulation\, and other regulatory requirements demand sophisticated security and compliance professionals to mitigate the risks posed by the regulatory agencies and cyberattacks. \nLearn how organizations can leverage virtual security and compliance officers to meet the regulatory requirements and cyber leaders and focus on their business by attending our 45-minute educational webinar. \nAudience: Business Owners\, CIOs and IT Professionals
URL:https://databrackets.com/event/virtual-security-compliance-and-data-protection-officers-for-small-to-medium-sized-organizations/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/vciso-feb-6.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200123T130000
DTEND;TZID=America/New_York:20200123T134500
DTSTAMP:20260416T020510
CREATED:20191224T060756Z
LAST-MODIFIED:20220210T083141Z
UID:46958-1579784400-1579787100@databrackets.com
SUMMARY:Become a databrackets Partner to Offer Compliance and Security Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Data Security\, Compliance and Certification Services \nApart from the frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology service industry.  We are opening up our tested and tried assessment and compliance platform to IT\, legal\, CPA and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities and the steps to become databrackets partner.  We have several testimonials from our partners who have expanded their services and revenue to include compliance and security services using our online assessment platform. \nSuggested Audience:  \n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191107T130000
DTEND;TZID=America/New_York:20191107T134500
DTSTAMP:20260416T020510
CREATED:20190923T045547Z
LAST-MODIFIED:20220210T083041Z
UID:46951-1573131600-1573134300@databrackets.com
SUMMARY:Disaster Recovery and Business Continuity Planning for Information Systems
DESCRIPTION:Business continuity planning and Disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for Disaster Recovery and how to plan for Business Continuity.
URL:https://databrackets.com/event/disaster-recovery-and-business-continuity-planning-for-information-systems/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Disaster-Recovery-nov-7.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191023T130000
DTEND;TZID=America/New_York:20191023T134500
DTSTAMP:20260416T020510
CREATED:20190923T044732Z
LAST-MODIFIED:20220210T083036Z
UID:46947-1571835600-1571838300@databrackets.com
SUMMARY:Vulnerability Assessment and Penetration Testing to Secure Data
DESCRIPTION:Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations.  Some of the benefits of proactively conducting VAPT:\n• Helps identify network security threats and risks across your organization\n• Leverages technology to help anticipate and prevent attacks\n• Provides recommendations for reducing risk and increasing compliance \nAttend our free\, live 45 minutes webinar to learn about how to Prepare\, Identify and Prioritize weaknesses and detailed remediation steps.
URL:https://databrackets.com/event/vulnerability-assessment-and-penetration-testing-to-secure-data/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Vulnerability-Assessment-23-oct.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190926T130000
DTEND;TZID=America/New_York:20190926T134500
DTSTAMP:20260416T020510
CREATED:20190823T044204Z
LAST-MODIFIED:20220210T083030Z
UID:46944-1569502800-1569505500@databrackets.com
SUMMARY:MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation
DESCRIPTION:The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls\, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1)\, apply security updates as necessary\, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline. \nThe Office of the National Coordinator for Health Information Technology (ONC) recognizes that conducting a risk assessment can be a challenging task which requires outside assistance. \nAttend our free\, live 45 minutes webinar to learn about how to prepare and attest to MIPS/MACRA Security Risk Assessment requirements. \nEnsure you complete a comprehensive security risk analysis and audit-proof your report. Our toolkit has been designed to help busy medical professionals like you to complete the risk assessment and meet the MIPS/MACRA requirements in less than an hour.  Read More >>
URL:https://databrackets.com/event/mips-macra-security-risk-assessment-requirements-for-attestation/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/MIPS_MACRA-feb-28.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190912T130000
DTEND;TZID=America/New_York:20190912T134500
DTSTAMP:20260416T020510
CREATED:20190807T043649Z
LAST-MODIFIED:20220210T083025Z
UID:46941-1568293200-1568295900@databrackets.com
SUMMARY:OSHA Assessment for Healthcare Organizations
DESCRIPTION:OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS\, Hepatitis C or other Blood Borne Diseases. \nOSHA’s updated record keeping rule expands the list of severe injuries that all employers must report to OSHA. Establishments located in states under Federal OSHA jurisdiction must begin to comply with the new requirements on January 1\, 2015. Establishments located in states that operate their own safety and health programs should check with their state plan for the implementation date of the new requirements. \nAttend our free\, live 45-minute webinar to learn about how OSHA assessments can help your organization about occupational safety requirements.
URL:https://databrackets.com/event/osha-assessment-for-healthcare-organizations-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/OSHA-Assessment-mar-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190815T130000
DTEND;TZID=America/New_York:20190815T134500
DTSTAMP:20260416T020510
CREATED:20190731T043125Z
LAST-MODIFIED:20220210T083021Z
UID:46937-1565874000-1565876700@databrackets.com
SUMMARY:How to Comply with California Consumer Privacy Act
DESCRIPTION:In June 2018\, the California legislature passed the California Consumer Privacy Act (CCPA). The CCPA is the most comprehensive privacy law in the United States to date and is designed to give Californians more control over their personal information. Join our 45-minute educational webinar on CCPA to learn more about the scope\, applicability\, timeline\, and requirements for complying with CCPA.
URL:https://databrackets.com/event/how-to-comply-with-california-consumer-privacy-act-draft/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/CCPA-aug-15.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190725T130000
DTEND;TZID=America/New_York:20190725T134500
DTSTAMP:20260416T020510
CREATED:20190626T042557Z
LAST-MODIFIED:20220210T083016Z
UID:46934-1564059600-1564062300@databrackets.com
SUMMARY:GDPR 101
DESCRIPTION:The far-reaching global data privacy laws\, GDPR\, is applicable to all companies handling the consumer data of citizens within the European Union (EU)\, no matter the size\, industry or country of origin of the business.  GDPR compliance requirement ranges from understanding the type of personal data being processed by the company\, developing a customer data processing consent policy\, reviewing and updating security measures to training the employees and update agreements with your sub-processors. Failure to GDPR compliance will burden the company with fines and compensation claims of up to  4% of their annual revenue. \nWe are very excited to have Michael Kohagen of Bagchi Law present with respect to the following topics related to GDPR: \n\nApplicability of GDPR\nImpact of GDPR on big-tech (e.g. Google\, Facebook)\, and the impact of big-tech data usage and practices on US data privacy laws (e.g. CCPA)\nContract and Data Privacy Addendum requirements of GDPR\n\nAttend our free\, live 45-minute webinar to learn about how GDPR compliance can be achieved by following the best practices developed by our speaker and the tools that will help you achieve continuous compliance.
URL:https://databrackets.com/event/gdpr-101/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/GDPR-Compliance-Readiness-event.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
END:VCALENDAR