BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//databrackets - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:databrackets
X-ORIGINAL-URL:https://databrackets.com
X-WR-CALDESC:Events for databrackets
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20160313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20161106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20170312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20171105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201210T130000
DTEND;TZID=America/New_York:20201210T140000
DTSTAMP:20260420T051439
CREATED:20200602T062738Z
LAST-MODIFIED:20220210T073100Z
UID:47011-1607605200-1607608800@databrackets.com
SUMMARY:Overview of NIST 800-53 Audit
DESCRIPTION:NIST 800-53 Guidelines consist of standards\, guidelines\, and best practices to manage information-related risks.  NIST 800-53 is being used by a wide range of businesses and organizations and helps shift organizations to be proactive about risk management. Revision 5 was announced and made publicly available recently. The changes include guidance on how to perform self-assessments\, additional detail on supply chain risk management\, and guidance on how to interact with supply chain stakeholders. \nAttend our free\, live 45-minute webinar to learn about how 800-53 assessments can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/nist-800-53-audit/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201029T130000
DTEND;TZID=America/New_York:20201029T140000
DTSTAMP:20260420T051439
CREATED:20201008T062124Z
LAST-MODIFIED:20220210T072703Z
UID:47008-1603976400-1603980000@databrackets.com
SUMMARY:NIST 800-171 Compliance Overview
DESCRIPTION:NIST SP 800-171 standards refers to National Institute of Standards and Technology Special Publication 800-171\, which governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. It is essentially a set of NIST standards that define how to safeguard and distribute material deemed sensitive but not classified. NIST 800-171 compliance is being used by a wide range of businesses and organizations to be proactive about risk management.  \nAttend our free\, live 45-minute webinar to learn about how NUST 800-171 compliance assessments can help your organization to improve your security posture and comply with your customer security requirements. \n 
URL:https://databrackets.com/event/nist-sp-800-171-compliance-overview/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T130000
DTEND;TZID=America/New_York:20201008T140000
DTSTAMP:20260420T051439
CREATED:20200917T061520Z
LAST-MODIFIED:20220210T072055Z
UID:47005-1602162000-1602165600@databrackets.com
SUMMARY:How to value your practice?
DESCRIPTION:The value of a medical practice impacts every aspect of the professional\, financial\, and personal life of a doctor and his family. Valuation exercise starts by asking some of the key questions: \n– How fair market value of the business is calculated? \n– What are the strategic and operational factors which impact business value? \n– What is the value of your business to a “strategic buyer” (e.g. value of a physician practice for a hospital)? \nJoin us for a free live 45-minutes webinar to learn more on how to value your practice. \n \n 
URL:https://databrackets.com/event/how-to-value-your-practice/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/money-doctor-M3EC68X.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200805T130000
DTEND;TZID=America/New_York:20200805T140000
DTSTAMP:20260420T051439
CREATED:20200722T061142Z
LAST-MODIFIED:20220210T071515Z
UID:47001-1596632400-1596636000@databrackets.com
SUMMARY:Become a databrackets’ Partner to Offer Compliance and Cybersecurity Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Cybersecurity\, Compliance and Certification Services\nApart from frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology services industry.  We are extending our tested and tried assessment and compliance platform to IT\, legal\, CPA\, and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities\, and steps to become a databrackets’ partner. Visit our partnership page to understand more. We have several testimonials from our partners who have expanded their services and revenue to include compliance and cybersecurity assessment services using our online platform. \n  \nSuggested Audience:\n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members\n\n 
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200723T130000
DTEND;TZID=America/New_York:20200723T140000
DTSTAMP:20260420T051439
CREATED:20200629T060855Z
LAST-MODIFIED:20220210T071134Z
UID:46997-1595509200-1595512800@databrackets.com
SUMMARY:Backup and Disaster Recovery – Best Practices to Defeat Ransomware
DESCRIPTION:Business continuity and disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for backup\, disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for disaster recovery and how to plan for business continuity. \n \n 
URL:https://databrackets.com/event/backup-and-disaster-recovery-best-practices-to-defeat-ransomware/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Ransomware.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200709T130000
DTEND;TZID=America/New_York:20200709T140000
DTSTAMP:20260420T051439
CREATED:20200624T055802Z
LAST-MODIFIED:20220210T070821Z
UID:46992-1594299600-1594303200@databrackets.com
SUMMARY:DevOps Security Best Practices
DESCRIPTION:The DevOps approach gives security practitioners and testers an opportunity to integrate security in the very early stages of software development and deployment process. While it’s clear that security should be ingrained throughout the entire DevOps lifecycle\, learn some of the best practices in the evolving practice for securing your DevOps shop. \nLearn more by attending our free live 45-minute webinar on best practices for securing DevOps. \n 
URL:https://databrackets.com/event/devops-security-best-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Pen-test1.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200604T110000
DTEND;TZID=America/New_York:20200604T120000
DTSTAMP:20260420T051439
CREATED:20200522T055208Z
LAST-MODIFIED:20220210T065651Z
UID:46988-1591268400-1591272000@databrackets.com
SUMMARY:Introduction to Yoga for Work from Home Professionals
DESCRIPTION:We are switching gears a bit this time around and introducing yoga and mindfulness for all our audience. As we all know\, millions of people across the world are working from home right now. Most people are surprised by the stress they feel once the novelty of working from home wears off\, and the stress of its challenges becomes more apparent. We will be sharing a few tips and tricks on how to stay energized while working from home with an introduction to Yoga\,  the eight limbs of yoga\, and simple breathing techniques. We are excited to have Yogacharya Amit Chatterjee join us  on this most important topic. \n \n 
URL:https://databrackets.com/event/yoga-techniques-for-work-from-home-professionals/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/wfh-yoga.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200528T130000
DTEND;TZID=America/New_York:20200528T140000
DTSTAMP:20260420T051439
CREATED:20200506T054601Z
LAST-MODIFIED:20220210T065203Z
UID:46984-1590670800-1590674400@databrackets.com
SUMMARY:Best Practices and Trends in Remote Working Technologies for Small/Medium Businesses
DESCRIPTION:Join this webinar with our friends from WorkSmart IT\, a top NC Managed IT Service Provider for small businesses and nonprofits\, for a discussion on the changing landscape of every-day business technology for remote office environments. You’ll hear about technology trends and solutions that will help keep your teams productive and collaborative; as well as factors that you should be considering to protect your business from the addition cybersecurity threats that occur as teams work remotely. \n \n 
URL:https://databrackets.com/event/best-practices-and-trends-in-remote-working-technologies-for-small-medium-businesses/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/young-mother-working-from-home.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T130000
DTEND;TZID=America/New_York:20200326T134500
DTSTAMP:20260420T051439
CREATED:20200207T062521Z
LAST-MODIFIED:20220210T062926Z
UID:46969-1585227600-1585230300@databrackets.com
SUMMARY:Security Hardening for AWS Cloud Hosting
DESCRIPTION:If you use a cloud-based service such as Amazon Web Services\, Amazon must agree to a written agreement to adhere to certain security and privacy compliance provisions set out in regulatory compliance requirements like HIPAA/HITECH\, GDPR\, CCPA\, etc. Apart from the written agreements from AWS\, AWS security hardening is required for most companies and other organizations that store sensitive data on the cloud as AWS only provides features to help harden the environment. Customers are responsible for ensuring their particular use of AWS complies with HIPAA\, the HITECH Act\, and other applicable state laws and regulations. \nJoin our webinar to learn how to assist organizations interested in hardening AWS services and to understand the relevant capabilities of Amazon AWS. \nIntended Audience: Privacy Officers\, Security Officers\, Compliance Officers\, and Business Associates responsible for HIPAA and HITECH Act implementation and compliance.
URL:https://databrackets.com/event/security-hardening-for-aws-cloud-hosting/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/icon-cloud-AWS-26-mar.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200305T130000
DTEND;TZID=America/New_York:20200305T134500
DTSTAMP:20260420T051439
CREATED:20200124T061910Z
LAST-MODIFIED:20220210T062414Z
UID:46967-1583413200-1583415900@databrackets.com
SUMMARY:System and Organization Controls: SOC Suite of Certifications
DESCRIPTION:Companies in a wide range of industries face growing market pressure to increase their competitive edge and prove the quality of their controls. A SOC (System and Organization Controls) report (formerly SAS 70) demonstrates to your clients a commitment to internal controls by providing third-party attestation to the reliability of the design\, implementation\, and operating effectiveness of your organization’s controls. An additional benefit of a SOC report is a reduced impact on your internal resources by minimizing the need for external audits. \nJoin our 45-minute webinar to learn more about the increasingly popular SOC 2 certification. \n  \nSuggested Audience: \n– SaaS Providers\n– IT Managers\n– Product Vendors\n– Managed IT service companies\n– Service Providers
URL:https://databrackets.com/event/system-and-organization-controls-soc-suite-of-certifications/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/soc-mar-5.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200206T130000
DTEND;TZID=America/New_York:20200206T134500
DTSTAMP:20260420T051439
CREATED:20200123T061327Z
LAST-MODIFIED:20220210T083146Z
UID:46961-1580994000-1580996700@databrackets.com
SUMMARY:Virtual security\, compliance\, and data protection officers for small to medium-sized organizations
DESCRIPTION:Small to medium-sized firms are struggling to find security/compliance officers that are required by law and cybersecurity challenges. Virtual officers appear to be the obvious solution to companies that cannot find a qualified professional due to cost\, tight labor market and ever-changing landscape of the industry. Sophisticated cyber attacks\, GDPR\, CCPA\, NY Cybersecurity Regulation\, and other regulatory requirements demand sophisticated security and compliance professionals to mitigate the risks posed by the regulatory agencies and cyberattacks. \nLearn how organizations can leverage virtual security and compliance officers to meet the regulatory requirements and cyber leaders and focus on their business by attending our 45-minute educational webinar. \nAudience: Business Owners\, CIOs and IT Professionals
URL:https://databrackets.com/event/virtual-security-compliance-and-data-protection-officers-for-small-to-medium-sized-organizations/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/vciso-feb-6.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200123T130000
DTEND;TZID=America/New_York:20200123T134500
DTSTAMP:20260420T051439
CREATED:20191224T060756Z
LAST-MODIFIED:20220210T083141Z
UID:46958-1579784400-1579787100@databrackets.com
SUMMARY:Become a databrackets Partner to Offer Compliance and Security Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Data Security\, Compliance and Certification Services \nApart from the frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology service industry.  We are opening up our tested and tried assessment and compliance platform to IT\, legal\, CPA and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities and the steps to become databrackets partner.  We have several testimonials from our partners who have expanded their services and revenue to include compliance and security services using our online assessment platform. \nSuggested Audience:  \n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191107T130000
DTEND;TZID=America/New_York:20191107T134500
DTSTAMP:20260420T051439
CREATED:20190923T045547Z
LAST-MODIFIED:20220210T083041Z
UID:46951-1573131600-1573134300@databrackets.com
SUMMARY:Disaster Recovery and Business Continuity Planning for Information Systems
DESCRIPTION:Business continuity planning and Disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for Disaster Recovery and how to plan for Business Continuity.
URL:https://databrackets.com/event/disaster-recovery-and-business-continuity-planning-for-information-systems/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Disaster-Recovery-nov-7.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191023T130000
DTEND;TZID=America/New_York:20191023T134500
DTSTAMP:20260420T051439
CREATED:20190923T044732Z
LAST-MODIFIED:20220210T083036Z
UID:46947-1571835600-1571838300@databrackets.com
SUMMARY:Vulnerability Assessment and Penetration Testing to Secure Data
DESCRIPTION:Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations.  Some of the benefits of proactively conducting VAPT:\n• Helps identify network security threats and risks across your organization\n• Leverages technology to help anticipate and prevent attacks\n• Provides recommendations for reducing risk and increasing compliance \nAttend our free\, live 45 minutes webinar to learn about how to Prepare\, Identify and Prioritize weaknesses and detailed remediation steps.
URL:https://databrackets.com/event/vulnerability-assessment-and-penetration-testing-to-secure-data/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Vulnerability-Assessment-23-oct.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190926T130000
DTEND;TZID=America/New_York:20190926T134500
DTSTAMP:20260420T051439
CREATED:20190823T044204Z
LAST-MODIFIED:20220210T083030Z
UID:46944-1569502800-1569505500@databrackets.com
SUMMARY:MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation
DESCRIPTION:The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls\, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1)\, apply security updates as necessary\, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline. \nThe Office of the National Coordinator for Health Information Technology (ONC) recognizes that conducting a risk assessment can be a challenging task which requires outside assistance. \nAttend our free\, live 45 minutes webinar to learn about how to prepare and attest to MIPS/MACRA Security Risk Assessment requirements. \nEnsure you complete a comprehensive security risk analysis and audit-proof your report. Our toolkit has been designed to help busy medical professionals like you to complete the risk assessment and meet the MIPS/MACRA requirements in less than an hour.  Read More >>
URL:https://databrackets.com/event/mips-macra-security-risk-assessment-requirements-for-attestation/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/MIPS_MACRA-feb-28.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190912T130000
DTEND;TZID=America/New_York:20190912T134500
DTSTAMP:20260420T051439
CREATED:20190807T043649Z
LAST-MODIFIED:20220210T083025Z
UID:46941-1568293200-1568295900@databrackets.com
SUMMARY:OSHA Assessment for Healthcare Organizations
DESCRIPTION:OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS\, Hepatitis C or other Blood Borne Diseases. \nOSHA’s updated record keeping rule expands the list of severe injuries that all employers must report to OSHA. Establishments located in states under Federal OSHA jurisdiction must begin to comply with the new requirements on January 1\, 2015. Establishments located in states that operate their own safety and health programs should check with their state plan for the implementation date of the new requirements. \nAttend our free\, live 45-minute webinar to learn about how OSHA assessments can help your organization about occupational safety requirements.
URL:https://databrackets.com/event/osha-assessment-for-healthcare-organizations-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/OSHA-Assessment-mar-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190815T130000
DTEND;TZID=America/New_York:20190815T134500
DTSTAMP:20260420T051439
CREATED:20190731T043125Z
LAST-MODIFIED:20220210T083021Z
UID:46937-1565874000-1565876700@databrackets.com
SUMMARY:How to Comply with California Consumer Privacy Act
DESCRIPTION:In June 2018\, the California legislature passed the California Consumer Privacy Act (CCPA). The CCPA is the most comprehensive privacy law in the United States to date and is designed to give Californians more control over their personal information. Join our 45-minute educational webinar on CCPA to learn more about the scope\, applicability\, timeline\, and requirements for complying with CCPA.
URL:https://databrackets.com/event/how-to-comply-with-california-consumer-privacy-act-draft/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/CCPA-aug-15.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190725T130000
DTEND;TZID=America/New_York:20190725T134500
DTSTAMP:20260420T051439
CREATED:20190626T042557Z
LAST-MODIFIED:20220210T083016Z
UID:46934-1564059600-1564062300@databrackets.com
SUMMARY:GDPR 101
DESCRIPTION:The far-reaching global data privacy laws\, GDPR\, is applicable to all companies handling the consumer data of citizens within the European Union (EU)\, no matter the size\, industry or country of origin of the business.  GDPR compliance requirement ranges from understanding the type of personal data being processed by the company\, developing a customer data processing consent policy\, reviewing and updating security measures to training the employees and update agreements with your sub-processors. Failure to GDPR compliance will burden the company with fines and compensation claims of up to  4% of their annual revenue. \nWe are very excited to have Michael Kohagen of Bagchi Law present with respect to the following topics related to GDPR: \n\nApplicability of GDPR\nImpact of GDPR on big-tech (e.g. Google\, Facebook)\, and the impact of big-tech data usage and practices on US data privacy laws (e.g. CCPA)\nContract and Data Privacy Addendum requirements of GDPR\n\nAttend our free\, live 45-minute webinar to learn about how GDPR compliance can be achieved by following the best practices developed by our speaker and the tools that will help you achieve continuous compliance.
URL:https://databrackets.com/event/gdpr-101/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/GDPR-Compliance-Readiness-event.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190723T130000
DTEND;TZID=America/New_York:20190723T134500
DTSTAMP:20260420T051439
CREATED:20190313T041847Z
LAST-MODIFIED:20220210T083011Z
UID:46930-1563886800-1563889500@databrackets.com
SUMMARY:FDA CFR Part 11 Compliance
DESCRIPTION:Title 21 CFR Part 11 is the part of Title 21 code of Federal Regulations that establish the Food and Drug Administration (FDA) regulations on electronic records and electronic signatures (ERES). \nPart 11 applies to records in electronic form that are created\, modified\, maintained\, archived\, retrieved\, or transmitted under any records requirements set forth in Agency regulations. Part 11 also applies to electronic records submitted to the Agency under the Federal Food\, Drug\, and Cosmetic Act (the Act) and the Public Health Service Act (the PHS Act)\, even if such records are not specifically identified in Agency regulations. \nAttend our free\, live 45-minute webinar to learn about how FDA CFR Part 11 compliance can be achieved by following the best practices developed by our speaker and the tools that will help you achieve continuous compliance.
URL:https://databrackets.com/event/fda-cfr-part-11-compliance/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/FDA-CFR-Part-jul-23.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190612T010000
DTEND;TZID=America/New_York:20190612T134500
DTSTAMP:20260420T051439
CREATED:20190529T041229Z
LAST-MODIFIED:20260206T073523Z
UID:46926-1560301200-1560347100@databrackets.com
SUMMARY:Financial Health Check-up for Medical Practices
DESCRIPTION:An overview of RCM and its impact on your financial health\nThe 7 best RCM practices you can implement\nThe areas of opportunity for improvements in the collections\nHow to actually increase revenue by following these best practices\n\nAttend our free\, live 45-minute webinar to learn about how this can be achieved by following the best practices developed by our speaker.
URL:https://databrackets.com/event/financial-health-check-up-for-medical-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Financial-Health-jun-12.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190529T130000
DTEND;TZID=America/New_York:20190529T134500
DTSTAMP:20260420T051439
CREATED:20190411T040707Z
LAST-MODIFIED:20220210T082955Z
UID:46923-1559134800-1559137500@databrackets.com
SUMMARY:SOC 2 Requirements and Certifications
DESCRIPTION:Companies in a wide range of industries face growing market pressure to increase their competitive edge and prove the quality of their controls. A SOC report (formerly SAS 70) demonstrates to your clients a commitment to internal controls by providing third-party attestation to the reliability of the design\, implementation\, and operating effectiveness of your organization’s controls. An additional benefit of a SOC report is a reduced impact on your internal resources by minimizing the need for external audits. \nJoin our 50-minute webinar to learn more about the increasingly popular SOC 2 certification. \n \n \n 
URL:https://databrackets.com/event/soc-2-requirements-and-certifications/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/SOC2-feb-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190515T130000
DTEND;TZID=America/New_York:20190515T134500
DTSTAMP:20260420T051439
CREATED:20190425T040026Z
LAST-MODIFIED:20220210T082944Z
UID:46920-1557925200-1557927900@databrackets.com
SUMMARY:Open Source Electronic Medical Records
DESCRIPTION:As small and medium practices you can minimize the cost of going paperless by using open source Electronic Medical Records software or by migrating from your existing proprietary EHR software. \nIn this webinar\, we’re going to provide open source EMR/EHR option available and its capabilities. We’re going to look at their features and the user reviews.\nAttend our free\, live 45-minute webinar to learn about how open source EMR can help in minimizing the cost of going paperless by using open source Electronic Medical Records software or by migrating from your existing proprietary EHR software. \n \n 
URL:https://databrackets.com/event/open-source-electronic-medical-records/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Open-Source-Electronic-may-15.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190425T130000
DTEND;TZID=America/New_York:20190425T140000
DTSTAMP:20260420T051439
CREATED:20190321T035643Z
LAST-MODIFIED:20260206T073841Z
UID:46916-1556197200-1556200800@databrackets.com
SUMMARY:Free Webinar: Become an EHR 2.0 Partner to Offer Compliance and Security Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Data Security\, Compliance and Certification Services\nApart from the frequent data breaches and audit fines\, regulatory compliance\, security and certification services is one of the fastest growing in the service industry.  We are opening up our tested and tried assessment and compliance platform to IT partners and other service providers to better manage data security and compliance requirements of their customers. \nJoin our 30-minute webinar to see the demo of our DIY toolkit features\, white-label capabilities and the steps to become EHR 2.0 partner.  We have several testimonials from our partners who have expanded their services to include compliance and security services using our online DIY toolkit. \nSuggested Audience:  \n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members\n\n \n 
URL:https://databrackets.com/event/free-webinar-become-a-ehr-2-0-partner-to-offer-compliance-and-security-services/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190410T130000
DTEND;TZID=America/New_York:20190410T134500
DTSTAMP:20260420T051439
CREATED:20190305T045154Z
LAST-MODIFIED:20220829T152523Z
UID:46914-1554901200-1554903900@databrackets.com
SUMMARY:NIST Cybersecurity Framework Assessment & Implementation
DESCRIPTION:NIST Cybersecurity Framework consists of standards\, guidelines\, and best practices to manage cybersecurity-related risks.  The Cybersecurity Framework’s prioritized\, flexible\, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. \nNIST CSF is being used by a wide range of businesses and organizations and helps shift organizations to be proactive about risk management. Version 1.1 was announced and made publicly available on April 16\, 2018. The changes include guidance on how to perform self-assessments\, additional detail on supply chain risk management and guidance on how to interact with supply chain stakeholders. \nAttend our free\, live 45-minute webinar to learn about how Cyber Security Framework assessments can help your organization about security requirements. \n \n \n 
URL:https://databrackets.com/event/cybersecurity-framework-nist-assessment/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/NIST-Cybersecurity-Framework-apr-10.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190313T130000
DTEND;TZID=America/New_York:20190313T140000
DTSTAMP:20260420T051439
CREATED:20190305T044652Z
LAST-MODIFIED:20260206T075331Z
UID:46909-1552482000-1552485600@databrackets.com
SUMMARY:OSHA Assessment for Healthcare Organizations
DESCRIPTION:OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS\, Hepatitis C or other Blood Borne Diseases. \nOSHA’s updated record keeping rule expands the list of severe injuries that all employers must report to OSHA. Establishments located in states under Federal OSHA jurisdiction must begin to comply with the new requirements on January 1\, 2015. Establishments located in states that operate their own safety and health programs should check with their state plan for the implementation date of the new requirements. \nAttend our free\, live 45-minute webinar to learn about how OSHA assessments can help your organization about occupational safety requirements.
URL:https://databrackets.com/event/osha-assessment-for-healthcare-organizations/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/OSHA-Assessment-mar-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190228T130000
DTEND;TZID=America/New_York:20190228T140000
DTSTAMP:20260420T051439
CREATED:20190214T043827Z
LAST-MODIFIED:20260206T075054Z
UID:46903-1551358800-1551362400@databrackets.com
SUMMARY:MIPS/MACRA Security Risk Assessment Requirements for Attestation
DESCRIPTION:The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls\, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1)\, apply security updates as necessary\, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline. \nThe Office of the National Coordinator for Health Information Technology (ONC) recognizes that conducting a risk assessment can be a challenging task which requires outside assistance. \nAttend our free\, live 50-minute webinar to learn about how to prepare and attest to MIPS/MACRA Security Risk Assessment requirements. \n \n 
URL:https://databrackets.com/event/mips-macra-security-risk-assessment-requirements/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/MIPS_MACRA-feb-28.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190213T130000
DTEND;TZID=America/New_York:20190213T140000
DTSTAMP:20260420T051439
CREATED:20190113T043229Z
LAST-MODIFIED:20220210T082730Z
UID:46899-1550062800-1550066400@databrackets.com
SUMMARY:SOC 2 Requirements and Certifications
DESCRIPTION:Companies in a wide range of industries face growing market pressure to increase their competitive edge and prove the quality of their controls. \nA SOC report (formerly SAS 70) demonstrates to your clients a commitment to internal controls by providing third-party attestation to the reliability of the design\, implementation\, and operating effectiveness of your organization’s controls. An additional benefit of a SOC report is a reduced impact on your internal resources by minimizing the need for external audits.  Join our 50-minute webinar to learn more about increasingly popular SOC 2 certification. \n \n 
URL:https://databrackets.com/event/soc-2-type-2-audit/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/SOC2-feb-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180613T130000
DTEND;TZID=America/New_York:20180613T140000
DTSTAMP:20260420T051439
CREATED:20180613T110336Z
LAST-MODIFIED:20260206T074210Z
UID:48958-1528894800-1528898400@databrackets.com
SUMMARY:HIPAA Hardening for G-Suite
DESCRIPTION:HIPAA Act applies to most doctors’ offices\, hospitals\, healthcare insurance companies\, and other organization that may have access to patient information (called Protected Health Information\, or PHI). \n\nDoes your practice use Google applications like Gmail\, Google drive\, Google Docs etc.?\nDo you use Google G-suite applications to transfer PHI data?\nDoes your practice have written BAA with Google services?\n\nJoin our 50-minute webinar to learn more on how to make use of the capabilities of G-suites in your healthcare setup and still stay HIPAA compliant\,  The intended audience for this session includes privacy officers\, security officers\, compliance officers\, and Business Associates responsible for HIPAA Act implementation and compliance. \n \n 
URL:https://databrackets.com/event/hipaa-hardening-for-g-suite/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/05/Compliance.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20180322T130000
DTEND;TZID=America/New_York:20180322T140000
DTSTAMP:20260420T051439
CREATED:20180305T120636Z
LAST-MODIFIED:20260206T075200Z
UID:49013-1521723600-1521727200@databrackets.com
SUMMARY:Modern IT for Small Healthcare Practices
DESCRIPTION:Over the past several years\, most of the modern healthcare practices have implemented the EHR/EMR and its byproducts. In addition\, there is a strong technology demand to implement cloud-based software as a service model\, telemedicine\, population health using data analytics and health information exchange to share data with third parties.\n This 50-minute session will highlight some of the technology best practices that small to medium-size healthcare practices can easily adapt to stay efficient\, compliant and competitive.
URL:https://databrackets.com/event/modern-small-healthcare-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/05/laptop-1385702_640.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20171025T130000
DTEND;TZID=America/New_York:20171025T140000
DTSTAMP:20260420T051439
CREATED:20171007T111451Z
LAST-MODIFIED:20260206T074418Z
UID:48962-1508936400-1508940000@databrackets.com
SUMMARY:HIPAA Hardening for Microsoft Azure Cloud Hosting
DESCRIPTION:HIPAA and the HITECH Act applies to most doctors’ offices\, hospitals\, health insurance companies\, and other companies that may have access to patient information (called Protected Health Information\, or PHI). If you use a cloud-based service such as Microsoft Azure\, Microsoft must agree in a written agreement to adhere to certain security and privacy compliance provisions set out in HIPAA and the HITECH Act. \nWhile Microsoft Azure includes features to help enable customers’ privacy and security compliance\, customers are responsible for ensuring their particular use of Azure complies with HIPAA\, the HITECH Act\, and other applicable state laws and regulations. \nJoin our webinar to learn how to assist organizations interested in hardening Azure services and to understand the relevant capabilities of Microsoft Azure. The intended audience for this session includes privacy officers\, security officers\, compliance officers\, and Business Associates responsible for HIPAA and HITECH Act implementation and compliance.
URL:https://databrackets.com/event/hipaa-hardening-for-microsoft-azure-cloud-hosting/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/05/azure-cloud-services-event.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
END:VCALENDAR