Skip to content
  • GDPR 101

    Virtual

    The far-reaching global data privacy laws, GDPR, is applicable to all companies handling the consumer data of citizens within the European Union (EU), no matter the size, industry or country of origin of the business.  GDPR compliance requirement ranges from understanding the type of personal data being processed by the company, developing a customer data processing […]

    Free
  • How to Comply with California Consumer Privacy Act

    Virtual

    In June 2018, the California legislature passed the California Consumer Privacy Act (CCPA). The CCPA is the most comprehensive privacy law in the United States to date and is designed to give Californians more control over their personal information. Join our 45-minute educational webinar on CCPA to learn more about the scope, applicability, timeline, and requirements […]

    Free
  • OSHA Assessment for Healthcare Organizations

    Virtual

    OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS, Hepatitis C […]

    Free
  • MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation

    Virtual

    The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR […]

    Free
  • Vulnerability Assessment and Penetration Testing to Secure Data

    Virtual

    Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations.  Some of the benefits of proactively conducting VAPT: • Helps identify network security threats and risks across your organization • Leverages technology to help anticipate and prevent […]

    Free
  • Disaster Recovery and Business Continuity Planning for Information Systems

    Virtual

    Business continuity planning and Disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation, even before a natural calamity or ransomware occurs. Disasters can be short or may […]

    Free