Penetration Testing Best Practices
Learn from our expert penetration testers as they provide an overview of penetration testing and discuss how it acts as a critical line of defense for protecting your organization’s assets.
Navigating the HITRUST CSF
Interested in becoming HITRUST CSF certified? In these webinars, learn how to prepare for a HITRUST CSF assessment, scoping best practices, what management’s role is during an assessment, and more.
GDPR Readiness
Understanding GDPR can be challenging. In these webinars, our Director of Regulatory Compliance provides a comprehensive overview of this revolutionary data privacy law.
Cloud Security
As more and more organizations migrate to the cloud, it drives cloud service customers to consider how the cloud will impact their privacy, security, and compliance. Learn about cloud security best practices from our cloud experts.
PCI Readiness Series
Overwhelmed by PCI? This webinar series will help you understand the whole standard and give tips and best practices for overcoming obstacles with PCI compliance.
Road to HIPAA Compliance Series
Ready for HIPAA compliance enforcement? Join the experts down the road to compliance and prepare for even the most challenging aspects of HIPAA compliance.
CFPB Readiness Series
CFPB requirements are being enforced. Are we ready? Learn the basics of building a CMS, managing vendor compliance, drafting policies & procedures, and more.
Chief Compliance Officer Series
Do you understand your role as Chief Compliance Officer? Define your role and responsibilities and learn compliance analytics, internal audit development and more.
Vendor Compliance Management Series
Join our Compliance Specialists as they define the required elements of your vendor compliance management program and discuss how to get started.
Information Security Webinars
This series lays the groundwork for data management and security using risk assessment, elements of an info-sec policy, and components for developing your security program.
Compliance is Never Enough Series
A common misconception, “I’m compliance, so I must be secure”. This 4-part series focuses on best practices for fully developing your security program.
Risk Management 101
Looking for a step-by-step approach to performing a HIPAA Risk Analysis? This series takes a detailed look at planning, conducting, and using your risk analysis.
What is a Cloud Access Security Broker (CASB)?
/in Blog, Cloud Security /by Hannah Grace HolladayA cloud access security broker (CASB) is a software security service that acts as an intermediary between business cloud users and cloud providers. CASBs monitor data flow to and from cloud platforms, ensuring that cloud use comply with information security policies and regulations. Much as a firewall enables businesses to enforce security policies for incoming […]
Ask the Expert: Penetration Testing
/in Penetration Testing Best Practices, Webinars /by Sarah HarveyPenetration testing is a critical line of defense when protecting your organization’s sensitive assets – especially Electronic Protected Health Information (ePHI). Penetration testing is the process of performing authorized security testing of an environment to identify and exploit weaknesses associated with the targeted systems, networks, and applications before those weaknesses can be exploited by a real attacker. When performed in support of HIPAA compliance, the goal is to identify issues that could result in unauthorized access to ePHI.
Internal vs. Third-Party Audits: Why You Need to be Leveraging Both
/in Webinars /by Sarah HarveyInternal Audits vs. External Audits Is an internal audit enough? Should you utilize both internal and external audits? This is an ongoing conversation in our arena. But at KirkpatrickPrice, we know that there is power in having both perspectives, especially when it comes to conquering your compliance goals. If you want to prove to your […]
Top Mistakes C-Level Execs Make When It Comes to Security and Compliance
/in Webinars /by Sarah HarveyHow Can C-Levels Overcome Compliance Challenges? The growth and maturity of the security function will only rise as far as its leader’s capacity. Cyber and compliance threats are advancing, threatening our organizations’ financial and human resources. Because of this, business leaders must learn how to overcome the potential mistakes they make when it comes to […]
Fact or Fiction: Everything You Need to Know about Leading Compliance Initiatives
/in Webinars /by Sarah HarveyWhy is Compliance is a Top 3 Initiative? It’s no secret that the cyber threat landscape is evolving at an alarming rate. Now more than ever, businesses must implement compliance initiatives to avoid the growing threats of a cyberattack in the new decade. As a leader of your organization, it’s your responsibility to see this […]