Select the topic that interests you and learn more about it. Some webinars may qualify for Continuing Professional Education (CPE) credits, which would be indicated in the description; a certificate of completion for CPE credits will be issued after our records indicate that the entire webinar was completed.
Come visit this page regularly, as we post new webinars.
AHLA Thought Leader Perspectives – Adopting Duty of Care Risk Analysis (DoCRA) to Drive Governance, Risk, and Compliance (GRC) 2019
How much security is enough? Business decision-makers juggle countless variables and make risk decisions using “due care” and “reasonableness.” Understand how to apply duty of care to your specific organization.
HALOCK senior partner, Terry Kurzynski, and Jennifer L. Rathburn, partner from Foley & Lardner LLP present the challenging topic of balancing compliance, security, and business objectives in the healthcare arena.
CIS RAM: This Math will Save You – Cyber Security Summit Chicago
CIS RAM. CIS® (Center for Internet Security, Inc.) just released its first risk assessment method, CIS Risk Assessment Method (RAM). CIS RAM uses a simple equation developed by the courts as the basis for reasonableness in your risk assessment. This method helps you define your acceptable level of risk in a way that creates consensus among executives, attorneys, and regulators.
VIDEO: The Value of a Penetration Test
Why it is essential.
How to Comply with Everything
1 Hr. webinar on how risk management can help you comply with anything
1 Hr. webinar on Risk Management as a security requirement
Surviving the HIPAA Security Rule
1 Hr. webinar about the new HIPAA Security Omnibus rule.
PCI DSS Updates & Changes, an Overview of Version 3.0
1 Hr. webinar explaining the updates to Version 3.0 of PCI DSS
The Kaizen of Information Risk
1 Hr. webinar introducing the processes that organizations use to constantly improve their security risk posture.
Friendly Fire: How “Cybersecurity” Management is Hurting Us
As we work to protect ourselves from cybersecurity threats Unintended consequences are hurting us. What can we do to avoid them?
In this high-powered webinar on ransomware, we define ransomware, what it is and what can be done about it.