Skip to content

GDPR 101

Virtual

The far-reaching global data privacy laws, GDPR, is applicable to all companies handling the consumer data of citizens within the European Union (EU), no matter the size, industry or country of origin of the business.  GDPR compliance requirement ranges from understanding the type of personal data being processed by the company, developing a customer data processing […]

Free

How to Comply with California Consumer Privacy Act

Virtual

In June 2018, the California legislature passed the California Consumer Privacy Act (CCPA). The CCPA is the most comprehensive privacy law in the United States to date and is designed to give Californians more control over their personal information. Join our 45-minute educational webinar on CCPA to learn more about the scope, applicability, timeline, and requirements […]

Free

OSHA Assessment for Healthcare Organizations

Virtual

OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS, Hepatitis C […]

Free

MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation

Virtual

The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR […]

Free

Vulnerability Assessment and Penetration Testing to Secure Data

Virtual

Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations.  Some of the benefits of proactively conducting VAPT: • Helps identify network security threats and risks across your organization • Leverages technology to help anticipate and prevent […]

Free

Disaster Recovery and Business Continuity Planning for Information Systems

Virtual

Business continuity planning and Disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation, even before a natural calamity or ransomware occurs. Disasters can be short or may […]

Free