BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//databrackets - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:databrackets
X-ORIGINAL-URL:https://databrackets.com
X-WR-CALDESC:Events for databrackets
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20180311T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20181104T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210617T130000
DTEND;TZID=America/New_York:20210617T140000
DTSTAMP:20260419T044143
CREATED:20210527T062257Z
LAST-MODIFIED:20260206T075835Z
UID:46862-1623934800-1623938400@databrackets.com
SUMMARY:Web Application Security
DESCRIPTION:Any online-based firm must prioritize web application security. Because of the worldwide nature of the Internet\, web properties are vulnerable to attacks from all over the world\, at various scales and levels of complexity. The security of websites\, web applications\, and web services such as APIs is referred to as web application security. \nAttend our free\, live 45-minute webinar to learn about how Web Application Security can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/web-application-security/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Web-Application-Security-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210513T130000
DTEND;TZID=America/New_York:20210513T140000
DTSTAMP:20260419T044143
CREATED:20210429T061253Z
LAST-MODIFIED:20260206T075755Z
UID:46858-1620910800-1620914400@databrackets.com
SUMMARY:Security Hardening of Microsoft Office 365
DESCRIPTION:The recommendations for organizations to assess and ensure that their newly deployed environment is configured to protect\, monitor\, and respond to potential 365 attackers are reaffirmed in Microsoft Office 365 Security Observations. \nThe redesigned Microsoft 365 security center brings together email\, collaboration\, identity\, and device threat prevention\, detection\, investigation\, and response in a single location. Businesses should build an operational cloud strategy to safeguard their infrastructure assets by defending against attacks related to their 365 migration and better securing 365 services. \nAttend our free\, live 45-minute webinar to learn about how the Security Hardening of Microsoft Office 365 can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/security-hardening-of-microsoft-office-365/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Security-Hardening-mo365-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210422T130000
DTEND;TZID=America/New_York:20210422T140000
DTSTAMP:20260419T044143
CREATED:20210319T060523Z
LAST-MODIFIED:20260206T075355Z
UID:46856-1619096400-1619100000@databrackets.com
SUMMARY:PCI Compliance Assessment
DESCRIPTION:The Payment Card Industry Data Protection Standard (PCI DSS) is checked through a PCI evaluation.\nIt’s a set of security standards for companies that accept\, process\, store\, or transfer credit card information. \nDuring the assessment\, a PCI Qualified Security Assessor (QSA) determines if the merchant has met the PCI DSS 12 requirements\, either directly or through a control that provides a similar standard of security to the PCI DSS requirement. \nAttend our free\, live 45-minute webinar to learn about how PCI Compliance Assessment can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/pci-compliance-assessment/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/PCI-Compliance-Assessment-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210318T130000
DTEND;TZID=America/New_York:20210318T140000
DTSTAMP:20260419T044143
CREATED:20210228T065758Z
LAST-MODIFIED:20260206T075820Z
UID:46853-1616072400-1616076000@databrackets.com
SUMMARY:SOC 2 Audit Certification
DESCRIPTION:SOC 2 (System and Organization Controls – commonly pronounced “sock 2”) audit certification for service organization reports is designed to help service organizations to build trust and confidence in the service performed and controls related to the services through a report by an independent CPA ( Certified Public Accountant). \nEach type of SOC for Service Organizations report is designed to help service organizations meet specific user needs. \nThese reports\, prepared in accordance with AT-C section 320\, ‘Reporting on an Examination of Controls at a Service Organization Relevant to User Entities’ Internal Control Over Financial Reporting. These are specifically intended to meet the needs of entities that use service organizations (user entities). \nCPAs that audit the user entities’ financial statements (user auditors)\, use these reports in evaluating the effect of the controls at the service organization on the user entities’ financial statements. \nAttend our free\, live 45-minute webinar to learn about how SOC 2 Audit Certification can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/soc-2-audit-certification/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2021/03/soc-1.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210225T130000
DTEND;TZID=America/New_York:20210225T140000
DTSTAMP:20260419T044143
CREATED:20210201T065254Z
LAST-MODIFIED:20220205T065624Z
UID:46851-1614258000-1614261600@databrackets.com
SUMMARY:NIST 800-171 Compliance Audit Overview
DESCRIPTION:NIST SP 800-171 standards refers to National Institute of Standards and Technology Special Publication 800-171\, which governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. It is essentially a set of NIST standards that define how to safeguard and distribute material deemed sensitive but not classified. \nNIST 800-171 compliance is being used by a wide range of businesses and organizations to be proactive about risk management. \nAttend our free\, live 45-minute webinar to learn about how NIST 800-171 compliance assessments can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/nist-800-171-compliance-audit-overview/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/NIST-800-171-Compliance-Audit-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210211T130000
DTEND;TZID=America/New_York:20210211T140000
DTSTAMP:20260419T044143
CREATED:20210129T064146Z
LAST-MODIFIED:20260206T074001Z
UID:46848-1613048400-1613052000@databrackets.com
SUMMARY:GDPR Compliance Readiness
DESCRIPTION:The far-reaching global data privacy laws\, GDPR\, is applicable to all companies handling the consumer data of citizens within the European Union (EU)\, no matter the size\, industry\, or country of origin of the business. GDPR compliance requirement ranges from understanding the type of personal data being processed by the company\, developing a customer data processing consent policy\, reviewing and updating security measures to training the employees and update agreements with your sub-processors. Failure to GDPR compliance will burden the company with fines and compensation claims of up to 4% of their annual revenue. \n \n 
URL:https://databrackets.com/event/gdpr-compliance-readiness/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/GDPR-Compliance-Readiness-event.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210128T130000
DTEND;TZID=America/New_York:20210128T140000
DTSTAMP:20260419T044143
CREATED:20210117T061537Z
LAST-MODIFIED:20220205T063807Z
UID:46837-1611838800-1611842400@databrackets.com
SUMMARY:ISO 27001 Implementation and Certification Process
DESCRIPTION:Organizations are increasingly seeking to implement ISO 27001 and achieve certification. However\, if you are starting from scratch it will be challenging to find out where to start. databrackets can help customers either implement ISO 27001 controls for a potential certification or help companies get certified on ISO 27001. Join our webinar where we answer your most common questions about ISO 27001 and look at the entire process. \n \n 
URL:https://databrackets.com/event/iso-27001-implementation-and-certification-process/
LOCATION:Virtual
ATTACH;FMTTYPE=image/gif:https://databrackets.com/wp-content/uploads/2022/02/ISO-27001-event.gif
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201217T130000
DTEND;TZID=America/New_York:20201217T140000
DTSTAMP:20260419T044143
CREATED:20200903T063105Z
LAST-MODIFIED:20220210T073355Z
UID:47015-1608210000-1608213600@databrackets.com
SUMMARY:Third-party Vendor Risk Assessments
DESCRIPTION:While outsourcing to third party vendors has great benefits including cost efficiency\, time-to-market\, and scalability\, it can introduce additional risks to the information if data isn’t properly managed. Vendor exposure is considered as one of the key vulnerabilities in organizations’ risk assessment. Several organizations are leveraging third-party risk assessment methodologies for reviewing their vendors’ risks including Shared Assessments\, CSA\, NIST 800-171\, etc. \nJoin our 45min webinar to  learn more about different vendor assessment standards and how you can leverage automated vendor assessment workflow to improve your process efficiencies. \n 
URL:https://databrackets.com/event/third-party-vendor-risk-assessments/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Risk-analysis-consulting-pricing.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201210T130000
DTEND;TZID=America/New_York:20201210T140000
DTSTAMP:20260419T044143
CREATED:20200602T062738Z
LAST-MODIFIED:20220210T073100Z
UID:47011-1607605200-1607608800@databrackets.com
SUMMARY:Overview of NIST 800-53 Audit
DESCRIPTION:NIST 800-53 Guidelines consist of standards\, guidelines\, and best practices to manage information-related risks.  NIST 800-53 is being used by a wide range of businesses and organizations and helps shift organizations to be proactive about risk management. Revision 5 was announced and made publicly available recently. The changes include guidance on how to perform self-assessments\, additional detail on supply chain risk management\, and guidance on how to interact with supply chain stakeholders. \nAttend our free\, live 45-minute webinar to learn about how 800-53 assessments can help your organization to improve your security posture and comply with your customer security requirements. \n \n 
URL:https://databrackets.com/event/nist-800-53-audit/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201029T130000
DTEND;TZID=America/New_York:20201029T140000
DTSTAMP:20260419T044143
CREATED:20201008T062124Z
LAST-MODIFIED:20220210T072703Z
UID:47008-1603976400-1603980000@databrackets.com
SUMMARY:NIST 800-171 Compliance Overview
DESCRIPTION:NIST SP 800-171 standards refers to National Institute of Standards and Technology Special Publication 800-171\, which governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. It is essentially a set of NIST standards that define how to safeguard and distribute material deemed sensitive but not classified. NIST 800-171 compliance is being used by a wide range of businesses and organizations to be proactive about risk management.  \nAttend our free\, live 45-minute webinar to learn about how NUST 800-171 compliance assessments can help your organization to improve your security posture and comply with your customer security requirements. \n 
URL:https://databrackets.com/event/nist-sp-800-171-compliance-overview/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/nist-sp-800-171-event.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20201008T130000
DTEND;TZID=America/New_York:20201008T140000
DTSTAMP:20260419T044143
CREATED:20200917T061520Z
LAST-MODIFIED:20220210T072055Z
UID:47005-1602162000-1602165600@databrackets.com
SUMMARY:How to value your practice?
DESCRIPTION:The value of a medical practice impacts every aspect of the professional\, financial\, and personal life of a doctor and his family. Valuation exercise starts by asking some of the key questions: \n– How fair market value of the business is calculated? \n– What are the strategic and operational factors which impact business value? \n– What is the value of your business to a “strategic buyer” (e.g. value of a physician practice for a hospital)? \nJoin us for a free live 45-minutes webinar to learn more on how to value your practice. \n \n 
URL:https://databrackets.com/event/how-to-value-your-practice/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/money-doctor-M3EC68X.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200805T130000
DTEND;TZID=America/New_York:20200805T140000
DTSTAMP:20260419T044143
CREATED:20200722T061142Z
LAST-MODIFIED:20220210T071515Z
UID:47001-1596632400-1596636000@databrackets.com
SUMMARY:Become a databrackets’ Partner to Offer Compliance and Cybersecurity Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Cybersecurity\, Compliance and Certification Services\nApart from frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology services industry.  We are extending our tested and tried assessment and compliance platform to IT\, legal\, CPA\, and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities\, and steps to become a databrackets’ partner. Visit our partnership page to understand more. We have several testimonials from our partners who have expanded their services and revenue to include compliance and cybersecurity assessment services using our online platform. \n  \nSuggested Audience:\n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members\n\n 
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200723T130000
DTEND;TZID=America/New_York:20200723T140000
DTSTAMP:20260419T044143
CREATED:20200629T060855Z
LAST-MODIFIED:20220210T071134Z
UID:46997-1595509200-1595512800@databrackets.com
SUMMARY:Backup and Disaster Recovery – Best Practices to Defeat Ransomware
DESCRIPTION:Business continuity and disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for backup\, disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for disaster recovery and how to plan for business continuity. \n \n 
URL:https://databrackets.com/event/backup-and-disaster-recovery-best-practices-to-defeat-ransomware/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Ransomware.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200709T130000
DTEND;TZID=America/New_York:20200709T140000
DTSTAMP:20260419T044143
CREATED:20200624T055802Z
LAST-MODIFIED:20220210T070821Z
UID:46992-1594299600-1594303200@databrackets.com
SUMMARY:DevOps Security Best Practices
DESCRIPTION:The DevOps approach gives security practitioners and testers an opportunity to integrate security in the very early stages of software development and deployment process. While it’s clear that security should be ingrained throughout the entire DevOps lifecycle\, learn some of the best practices in the evolving practice for securing your DevOps shop. \nLearn more by attending our free live 45-minute webinar on best practices for securing DevOps. \n 
URL:https://databrackets.com/event/devops-security-best-practices/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Pen-test1.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200604T110000
DTEND;TZID=America/New_York:20200604T120000
DTSTAMP:20260419T044143
CREATED:20200522T055208Z
LAST-MODIFIED:20220210T065651Z
UID:46988-1591268400-1591272000@databrackets.com
SUMMARY:Introduction to Yoga for Work from Home Professionals
DESCRIPTION:We are switching gears a bit this time around and introducing yoga and mindfulness for all our audience. As we all know\, millions of people across the world are working from home right now. Most people are surprised by the stress they feel once the novelty of working from home wears off\, and the stress of its challenges becomes more apparent. We will be sharing a few tips and tricks on how to stay energized while working from home with an introduction to Yoga\,  the eight limbs of yoga\, and simple breathing techniques. We are excited to have Yogacharya Amit Chatterjee join us  on this most important topic. \n \n 
URL:https://databrackets.com/event/yoga-techniques-for-work-from-home-professionals/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/wfh-yoga.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200528T130000
DTEND;TZID=America/New_York:20200528T140000
DTSTAMP:20260419T044143
CREATED:20200506T054601Z
LAST-MODIFIED:20220210T065203Z
UID:46984-1590670800-1590674400@databrackets.com
SUMMARY:Best Practices and Trends in Remote Working Technologies for Small/Medium Businesses
DESCRIPTION:Join this webinar with our friends from WorkSmart IT\, a top NC Managed IT Service Provider for small businesses and nonprofits\, for a discussion on the changing landscape of every-day business technology for remote office environments. You’ll hear about technology trends and solutions that will help keep your teams productive and collaborative; as well as factors that you should be considering to protect your business from the addition cybersecurity threats that occur as teams work remotely. \n \n 
URL:https://databrackets.com/event/best-practices-and-trends-in-remote-working-technologies-for-small-medium-businesses/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/young-mother-working-from-home.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200507T130000
DTEND;TZID=America/New_York:20200507T140000
DTSTAMP:20260419T044143
CREATED:20200430T054223Z
LAST-MODIFIED:20220210T064540Z
UID:46981-1588856400-1588860000@databrackets.com
SUMMARY:Vulnerability Assessment and Penetration Testing (VAPT) to Secure Data
DESCRIPTION:Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations. Some of the benefits of proactively conducting VAPT:\n• Helps identify network security threats and risks across your organization\n• Leverages technology to help anticipate and prevent attacks\n• Provides recommendations for reducing risk and increasing compliance \nAttend our free\, live webinar to learn about how to prepare\, identify\, and prioritize weaknesses and remediate vulnerabilities.
URL:https://databrackets.com/event/vulnerability-assessment-and-penetration-testing-to-secure-data-2/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/pentest-400.jpeg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200430T130000
DTEND;TZID=America/New_York:20200430T140000
DTSTAMP:20260419T044143
CREATED:20200327T053920Z
LAST-MODIFIED:20220210T064646Z
UID:46979-1588251600-1588255200@databrackets.com
SUMMARY:Security Hardening of Azure Cloud Hosting Platform
DESCRIPTION:If you use a cloud-based service such as Azure Cloud\, Microsoft must agree to a written agreement to adhere to certain security and privacy compliance provisions set out in regulatory compliance requirements like HIPAA/HITECH\, GDPR\, CCPA\, etc. Apart from the written agreements from Microsfot\,  Azure security hardening is required for most companies and other organizations that store sensitive data on the cloud as Azure only provides features to help harden the environment. Customers are responsible for ensuring their particular use of Azure complies with HIPAA\, the HITECH Act\, and other applicable state laws and regulations. \nJoin our webinar to learn how to assist organizations interested in hardening Azure services and to understand the relevant capabilities of Microsoft Cloud. \nIntended Audience: Privacy Officers\, Security Officers\, Compliance Officers\, and Business Associates responsible for Compliance.
URL:https://databrackets.com/event/security-hardening-of-azure-cloud-hosting-platform/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Microsoft-Azure-Security-Best-Practices.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200409T130000
DTEND;TZID=America/New_York:20200409T140000
DTSTAMP:20260419T044143
CREATED:20200408T053056Z
LAST-MODIFIED:20220210T064638Z
UID:46973-1586437200-1586440800@databrackets.com
SUMMARY:COVID-19 and Telehealth
DESCRIPTION:In this webinar on COVID-19 and Telehealth\, Dr. Vijayalakshmi Balakrishnan will answer all the frequently asked questions about COVID-19 and options to get initial help using online tools and resources. Also\, we will be discussing how we got here and what online resources are there to manage coronavirus related queries. We also discuss potential online screening options\, how you can get support\, and finally\, how we can support each other and be good neighbors in this new world.
URL:https://databrackets.com/event/covid-19-and-telehealth/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/woman-reading-messages-from-her-doctor.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T130000
DTEND;TZID=America/New_York:20200326T134500
DTSTAMP:20260419T044143
CREATED:20200207T062521Z
LAST-MODIFIED:20220210T062926Z
UID:46969-1585227600-1585230300@databrackets.com
SUMMARY:Security Hardening for AWS Cloud Hosting
DESCRIPTION:If you use a cloud-based service such as Amazon Web Services\, Amazon must agree to a written agreement to adhere to certain security and privacy compliance provisions set out in regulatory compliance requirements like HIPAA/HITECH\, GDPR\, CCPA\, etc. Apart from the written agreements from AWS\, AWS security hardening is required for most companies and other organizations that store sensitive data on the cloud as AWS only provides features to help harden the environment. Customers are responsible for ensuring their particular use of AWS complies with HIPAA\, the HITECH Act\, and other applicable state laws and regulations. \nJoin our webinar to learn how to assist organizations interested in hardening AWS services and to understand the relevant capabilities of Amazon AWS. \nIntended Audience: Privacy Officers\, Security Officers\, Compliance Officers\, and Business Associates responsible for HIPAA and HITECH Act implementation and compliance.
URL:https://databrackets.com/event/security-hardening-for-aws-cloud-hosting/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/icon-cloud-AWS-26-mar.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200305T130000
DTEND;TZID=America/New_York:20200305T134500
DTSTAMP:20260419T044143
CREATED:20200124T061910Z
LAST-MODIFIED:20220210T062414Z
UID:46967-1583413200-1583415900@databrackets.com
SUMMARY:System and Organization Controls: SOC Suite of Certifications
DESCRIPTION:Companies in a wide range of industries face growing market pressure to increase their competitive edge and prove the quality of their controls. A SOC (System and Organization Controls) report (formerly SAS 70) demonstrates to your clients a commitment to internal controls by providing third-party attestation to the reliability of the design\, implementation\, and operating effectiveness of your organization’s controls. An additional benefit of a SOC report is a reduced impact on your internal resources by minimizing the need for external audits. \nJoin our 45-minute webinar to learn more about the increasingly popular SOC 2 certification. \n  \nSuggested Audience: \n– SaaS Providers\n– IT Managers\n– Product Vendors\n– Managed IT service companies\n– Service Providers
URL:https://databrackets.com/event/system-and-organization-controls-soc-suite-of-certifications/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/soc-mar-5.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200206T130000
DTEND;TZID=America/New_York:20200206T134500
DTSTAMP:20260419T044143
CREATED:20200123T061327Z
LAST-MODIFIED:20220210T083146Z
UID:46961-1580994000-1580996700@databrackets.com
SUMMARY:Virtual security\, compliance\, and data protection officers for small to medium-sized organizations
DESCRIPTION:Small to medium-sized firms are struggling to find security/compliance officers that are required by law and cybersecurity challenges. Virtual officers appear to be the obvious solution to companies that cannot find a qualified professional due to cost\, tight labor market and ever-changing landscape of the industry. Sophisticated cyber attacks\, GDPR\, CCPA\, NY Cybersecurity Regulation\, and other regulatory requirements demand sophisticated security and compliance professionals to mitigate the risks posed by the regulatory agencies and cyberattacks. \nLearn how organizations can leverage virtual security and compliance officers to meet the regulatory requirements and cyber leaders and focus on their business by attending our 45-minute educational webinar. \nAudience: Business Owners\, CIOs and IT Professionals
URL:https://databrackets.com/event/virtual-security-compliance-and-data-protection-officers-for-small-to-medium-sized-organizations/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/png:https://databrackets.com/wp-content/uploads/2022/02/vciso-feb-6.png
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200123T130000
DTEND;TZID=America/New_York:20200123T134500
DTSTAMP:20260419T044143
CREATED:20191224T060756Z
LAST-MODIFIED:20220210T083141Z
UID:46958-1579784400-1579787100@databrackets.com
SUMMARY:Become a databrackets Partner to Offer Compliance and Security Services
DESCRIPTION:Deliver More Value to Your Customers by Providing Data Security\, Compliance and Certification Services \nApart from the frequent data breaches and audit fines\, regulatory compliance\, security\, and certification services are one of the fastest-growing in the technology service industry.  We are opening up our tested and tried assessment and compliance platform to IT\, legal\, CPA and other service providers to better manage data security and regulatory compliance requirements of their customers. \nJoin our 45-minute live webinar to see the demo of our platform features\, white-label capabilities and the steps to become databrackets partner.  We have several testimonials from our partners who have expanded their services and revenue to include compliance and security services using our online assessment platform. \nSuggested Audience:  \n\nManaged IT service companies\nLegal firms\nAccounting firms\nPractice management companies\nOrganizations offering services to members
URL:https://databrackets.com/event/become-a-databrackets-partner-to-offer-compliance-and-security-services/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Partner-to-Offer-Compliance-apr-25.jpg
ORGANIZER;CN="databrackets":MAILTO:info@databrackets.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191205T130000
DTEND;TZID=America/New_York:20191205T134500
DTSTAMP:20260419T044143
CREATED:20191031T050027Z
LAST-MODIFIED:20220210T083123Z
UID:46955-1575550800-1575553500@databrackets.com
SUMMARY:MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation
DESCRIPTION:The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls\, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1)\, apply security updates as necessary\, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline. \nThe Office of the National Coordinator for Health Information Technology (ONC) recognizes that conducting a risk assessment can be a challenging task which requires outside assistance. \nAttend our free\, live 45 minutes webinar to learn about how to prepare and attest to MIPS/MACRA Security Risk Assessment requirements. \nEnsure you complete a comprehensive security risk analysis and audit-proof your report. Our toolkit has been designed to help busy medical professionals like you to complete the risk assessment and meet the MIPS/MACRA requirements in less than an hour.  Read More >>
URL:https://databrackets.com/event/mips-macra-security-risk-assessment-requirements-for-2019-attestation/
LOCATION:Virtual
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/MIPS_MACRA-feb-28.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191107T130000
DTEND;TZID=America/New_York:20191107T134500
DTSTAMP:20260419T044143
CREATED:20190923T045547Z
LAST-MODIFIED:20220210T083041Z
UID:46951-1573131600-1573134300@databrackets.com
SUMMARY:Disaster Recovery and Business Continuity Planning for Information Systems
DESCRIPTION:Business continuity planning and Disaster recovery planning for information systems are the most crucial elements of a business that solely relies on technology but are often ignored. Businesses must make a well-structured plan and document for disaster recovery and business continuation\, even before a natural calamity or ransomware occurs. Disasters can be short or may last for a long time\, but when an organization is ready for any adversity\, it thrives hard and survives. \nAttend our free\, live 45 minutes webinar to learn about how to prepare for Disaster Recovery and how to plan for Business Continuity.
URL:https://databrackets.com/event/disaster-recovery-and-business-continuity-planning-for-information-systems/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Disaster-Recovery-nov-7.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20191023T130000
DTEND;TZID=America/New_York:20191023T134500
DTSTAMP:20260419T044143
CREATED:20190923T044732Z
LAST-MODIFIED:20220210T083036Z
UID:46947-1571835600-1571838300@databrackets.com
SUMMARY:Vulnerability Assessment and Penetration Testing to Secure Data
DESCRIPTION:Gaining awareness of the security vulnerabilities of your information systems and identifying a roadmap for remediation is crucial part of securing your organization and complying with many regulations.  Some of the benefits of proactively conducting VAPT:\n• Helps identify network security threats and risks across your organization\n• Leverages technology to help anticipate and prevent attacks\n• Provides recommendations for reducing risk and increasing compliance \nAttend our free\, live 45 minutes webinar to learn about how to Prepare\, Identify and Prioritize weaknesses and detailed remediation steps.
URL:https://databrackets.com/event/vulnerability-assessment-and-penetration-testing-to-secure-data/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/Vulnerability-Assessment-23-oct.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190926T130000
DTEND;TZID=America/New_York:20190926T134500
DTSTAMP:20260419T044143
CREATED:20190823T044204Z
LAST-MODIFIED:20220210T083030Z
UID:46944-1569502800-1569505500@databrackets.com
SUMMARY:MIPS/MACRA Security Risk Assessment Requirements for 2019 Attestation
DESCRIPTION:The primary purpose of security risk analysis for MIPS/MACRA is to identify key technical vulnerabilities in the electronic Protected Health Information (ePHI) and EHR systems environments.  In order to implement appropriate technical controls\, eligible professionals and hospitals need to conduct a security risk analysis in accordance with the requirements under HIPAA security rule 45 CFR 164.308(a)(1)\, apply security updates as necessary\, and correct identified security deficiencies as part of their risk management process before MU/MIPS attestation deadline. \nThe Office of the National Coordinator for Health Information Technology (ONC) recognizes that conducting a risk assessment can be a challenging task which requires outside assistance. \nAttend our free\, live 45 minutes webinar to learn about how to prepare and attest to MIPS/MACRA Security Risk Assessment requirements. \nEnsure you complete a comprehensive security risk analysis and audit-proof your report. Our toolkit has been designed to help busy medical professionals like you to complete the risk assessment and meet the MIPS/MACRA requirements in less than an hour.  Read More >>
URL:https://databrackets.com/event/mips-macra-security-risk-assessment-requirements-for-attestation/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/MIPS_MACRA-feb-28.jpg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190912T130000
DTEND;TZID=America/New_York:20190912T134500
DTSTAMP:20260419T044143
CREATED:20190807T043649Z
LAST-MODIFIED:20220210T083025Z
UID:46941-1568293200-1568295900@databrackets.com
SUMMARY:OSHA Assessment for Healthcare Organizations
DESCRIPTION:OSHA’s Blood Borne Pathogens standard prescribes safeguards to protect workers against the health hazards from exposure to blood and other potentially infectious materials and to reduce their risk from this exposure. Implementation of this standard will not only prevent Hepatitis B cases but will also significantly reduce the risk of workers contracting AIDS\, Hepatitis C or other Blood Borne Diseases. \nOSHA’s updated record keeping rule expands the list of severe injuries that all employers must report to OSHA. Establishments located in states under Federal OSHA jurisdiction must begin to comply with the new requirements on January 1\, 2015. Establishments located in states that operate their own safety and health programs should check with their state plan for the implementation date of the new requirements. \nAttend our free\, live 45-minute webinar to learn about how OSHA assessments can help your organization about occupational safety requirements.
URL:https://databrackets.com/event/osha-assessment-for-healthcare-organizations-2/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/OSHA-Assessment-mar-13.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190815T130000
DTEND;TZID=America/New_York:20190815T134500
DTSTAMP:20260419T044143
CREATED:20190731T043125Z
LAST-MODIFIED:20220210T083021Z
UID:46937-1565874000-1565876700@databrackets.com
SUMMARY:How to Comply with California Consumer Privacy Act
DESCRIPTION:In June 2018\, the California legislature passed the California Consumer Privacy Act (CCPA). The CCPA is the most comprehensive privacy law in the United States to date and is designed to give Californians more control over their personal information. Join our 45-minute educational webinar on CCPA to learn more about the scope\, applicability\, timeline\, and requirements for complying with CCPA.
URL:https://databrackets.com/event/how-to-comply-with-california-consumer-privacy-act-draft/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/CCPA-aug-15.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20190725T130000
DTEND;TZID=America/New_York:20190725T134500
DTSTAMP:20260419T044143
CREATED:20190626T042557Z
LAST-MODIFIED:20220210T083016Z
UID:46934-1564059600-1564062300@databrackets.com
SUMMARY:GDPR 101
DESCRIPTION:The far-reaching global data privacy laws\, GDPR\, is applicable to all companies handling the consumer data of citizens within the European Union (EU)\, no matter the size\, industry or country of origin of the business.  GDPR compliance requirement ranges from understanding the type of personal data being processed by the company\, developing a customer data processing consent policy\, reviewing and updating security measures to training the employees and update agreements with your sub-processors. Failure to GDPR compliance will burden the company with fines and compensation claims of up to  4% of their annual revenue. \nWe are very excited to have Michael Kohagen of Bagchi Law present with respect to the following topics related to GDPR: \n\nApplicability of GDPR\nImpact of GDPR on big-tech (e.g. Google\, Facebook)\, and the impact of big-tech data usage and practices on US data privacy laws (e.g. CCPA)\nContract and Data Privacy Addendum requirements of GDPR\n\nAttend our free\, live 45-minute webinar to learn about how GDPR compliance can be achieved by following the best practices developed by our speaker and the tools that will help you achieve continuous compliance.
URL:https://databrackets.com/event/gdpr-101/
LOCATION:Virtual
CATEGORIES:Webinars
ATTACH;FMTTYPE=image/jpeg:https://databrackets.com/wp-content/uploads/2022/02/GDPR-Compliance-Readiness-event.jpeg
ORGANIZER;CN="EHR 2.0":MAILTO:info@ehr20.com
END:VEVENT
END:VCALENDAR