IT and PCI Compliance

IT and PCI Compliance
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and v.....

$200.00
GDPR, Are You Ready?
GDPR, Are You Ready?

What is the regulation called GDPR? Is your business ready for the change? How do these new laws aff.....

$200.00
HIPAA Audits – an Insiders Perspective
HIPAA Audits – an Insiders Perspective

I will be speaking to real life audits conducted by the Federal government for Phase 2 and beyond (I.....

$200.00
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018

ISO 27001 describes how to manage information security in a company. According to its documentation,.....

$200.00
PM Skills for BAs-Planning, Estimating, and Controlling BA Work
PM Skills for BAs-Planning, Estimating, and Controlling BA Work

Is poor project management impacting your effectiveness? What can you do about it? How’s that workin.....

$200.00
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies

Learn to properly use Project Management Principles to prepare for an impact to the business for any.....

$200.00
HIPAA training for the Compliance Officer
HIPAA training for the Compliance Officer

This webinar will be addressing how practice/business managers (or compliance offers) need to get th.....

$200.00
Cybersecurity risks; breaches, data theft, and the dark web
Cybersecurity risks; breaches, data theft, and the dark web

The course will cover the impacts of breaches, as well as the use and content of the dark web, where.....

$165.00
Business Email Compromise (BEC)
Business Email Compromise (BEC)

What is Business Email Compromise (BEC)BEC ScenariosWhat can be done to prevent it?Business Email Co.....

$165.00
Presentation Skills for IT Professionals
Presentation Skills for IT Professionals

The ability to present articulately to management, to customer or to a non tech audience can signifi.....

$165.00
Payment Card Industry (PCI) Risk & Compliance
Payment Card Industry (PCI) Risk & Compliance

The course will cover a general overview of the Payment Card Industry (PCI) compliance. To include w.....

$165.00
Auditing Business Continuity Plans According to ISO 22301
Auditing Business Continuity Plans According to ISO 22301

This training will cover the best practices for implementing and auditing a Business Continuity Plan.....

$155.00
IT Auditing: How to Apply Analytical Procedures
IT Auditing: How to Apply Analytical Procedures

Individual audit objectives and practices vary considerably from entity to entity, and there are man.....

$155.00
8 Proactive Software Quality Assurance™ Overcomes Traditional ‘Traffic Cop’ SQA Resistance
8 Proactive Software Quality Assurance™ Overcomes Traditional ‘Traffic Cop’ SQA Resistance

Is your QA/testing resisted? Is “QA” in your title or role, but all you do is testing or act like a .....

$155.00
Ransomware
Ransomware

What is ransomware?How to minimize your chances of a ransomware infection?What can we do to save the.....

$155.00
Showing 1 to 15 of 24 (2 Pages)