Penetration Testing Best Practices
Learn from our expert penetration testers as they provide an overview of penetration testing and discuss how it acts as a critical line of defense for protecting your organization’s assets.
Navigating the HITRUST CSF
Interested in becoming HITRUST CSF certified? In these webinars, learn how to prepare for a HITRUST CSF assessment, scoping best practices, what management’s role is during an assessment, and more.
GDPR Readiness
Understanding GDPR can be challenging. In these webinars, our Director of Regulatory Compliance provides a comprehensive overview of this revolutionary data privacy law.
Cloud Security
As more and more organizations migrate to the cloud, it drives cloud service customers to consider how the cloud will impact their privacy, security, and compliance. Learn about cloud security best practices from our cloud experts.
PCI Readiness Series
Overwhelmed by PCI? This webinar series will help you understand the whole standard and give tips and best practices for overcoming obstacles with PCI compliance.
Road to HIPAA Compliance Series
Ready for HIPAA compliance enforcement? Join the experts down the road to compliance and prepare for even the most challenging aspects of HIPAA compliance.
CFPB Readiness Series
CFPB requirements are being enforced. Are we ready? Learn the basics of building a CMS, managing vendor compliance, drafting policies & procedures, and more.
Chief Compliance Officer Series
Do you understand your role as Chief Compliance Officer? Define your role and responsibilities and learn compliance analytics, internal audit development and more.
Vendor Compliance Management Series
Join our Compliance Specialists as they define the required elements of your vendor compliance management program and discuss how to get started.
Information Security Webinars
This series lays the groundwork for data management and security using risk assessment, elements of an info-sec policy, and components for developing your security program.
Compliance is Never Enough Series
A common misconception, “I’m compliance, so I must be secure”. This 4-part series focuses on best practices for fully developing your security program.
Risk Management 101
Looking for a step-by-step approach to performing a HIPAA Risk Analysis? This series takes a detailed look at planning, conducting, and using your risk analysis.
Internal vs. Third-Party Audits: Why You Need to be Leveraging Both
/0 Comments/in Webinars /by Ashlyn BurgettInternal Audits vs. External Audits Is an internal audit enough? Should you utilize both internal and external audits? This is an ongoing conversation in our arena. But at KirkpatrickPrice, we know that there is power in having both perspectives, especially when it comes to conquering your compliance goals. If you want to prove to your […]
Top Mistakes C-Level Execs Make When It Comes to Security and Compliance
/0 Comments/in Webinars /by Ashlyn BurgettHow Can C-Levels Overcome Compliance Challenges? The growth and maturity of the security function will only rise as far as its leader’s capacity. Cyber and compliance threats are advancing, threatening our organizations’ financial and human resources. Because of this, business leaders must learn how to overcome the potential mistakes they make when it comes to […]
Fact or Fiction: Everything You Need to Know about Leading Compliance Initiatives
/0 Comments/in Webinars /by Ashlyn BurgettWhy is Compliance is a Top 3 Initiative? It’s no secret that the cyber threat landscape is evolving at an alarming rate. Now more than ever, businesses must implement compliance initiatives to avoid the growing threats of a cyberattack in the new decade. As a leader of your organization, it’s your responsibility to see this […]
Think Like a Hacker: How Could Your Mobile Apps Be Compromised?
/0 Comments/in Webinars /by Ashlyn BurgettThe Pros and Cons of Mobile Applications When you provide mobile apps to customers, they’re expecting them to be secure. They’ve entrusted you with their sensitive data by using your product, and it’s up to you to protect that data. Businesses today must do everything possible to mitigate the advancing threats facing mobile apps, both […]
Think Like a Hacker: Common Vulnerabilities Found in Wireless Pen Tests
/0 Comments/in Webinars /by Ashlyn BurgettCommon Ways Wireless Devices, Applications, and Networks are Exploited From hand-held wireless devices to wireless networks, your organization probably depends on the convenience and accessibility of wireless devices to conduct business – but wireless devices are just as likely as any other technology to be compromised by hackers. Do you know what vulnerabilities your wireless […]