A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
: Susan Strauss
Recorded Webinar

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and various State lawmakers have been accused of sexual harassment and/or sexual assault. But there is a difference between pulling one’s pants down in front of a female colleague at work and touching a woman on her buttocks during a photo op—isn’t there? What is that difference? Are both examples considered sexua.....

$200.00
GDPR, Are You Ready?
GDPR, Are You Ready?
: Mack Jackson Jr.
Recorded Webinar

What is the regulation called GDPR? Is your business ready for the change? How do these new laws affect your business? What is sensitive data? These are some of the questions that this webinar called "GDPR, are you ready?" Can answer.This webinar is a comprehensive discussion on the General Data Protection Regulation from the EU. The General Data Protection Regulation (GDPR) which is designed to enable indi.....

$200.00
HIPAA Audits – an Insiders Perspective
HIPAA Audits – an Insiders Perspective
: Brian L Tuttle
Recorded Webinar

I will be speaking to real life audits conducted by the Federal government for Phase 2 and beyond (I’ve been on both sides of these audits) what your highest risks are for being fined (some of the risk factors may surprise you). It seems almost daily I am receiving calls from nervous practice managers and compliance officers all over the USA regarding a HIPAA audit letter or call they have received. This le.....

$200.00
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
: Michael C. Redmond
Recorded Webinar

ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure a robust security for your organization's vital i.....

$200.00
PM Skills for BAs-Planning, Estimating, and Controlling BA Work
PM Skills for BAs-Planning, Estimating, and Controlling BA Work
: Robin F. Goldsmith
Recorded Webinar

Is poor project management impacting your effectiveness? What can you do about it? How’s that working out? Historically, Business Analysts (BAs) and Project Managers (PMs) focus on and are trained in separate skill sets. BAs focus on requirements definition, whereas PMs concentrate on budgets, schedules, resources, and tasks. Having both PM and BA present on a project presumably enables covering all bases w.....

$200.00
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
: Michael C. Redmond
Recorded Webinar

Learn to properly use Project Management Principles to prepare for an impact to the business for any organization. We will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review  the continuity planning program. Areas such as Project Management of IT Outsourcing and other risks will .....

$200.00
HIPAA training for the Compliance Officer
HIPAA training for the Compliance Officer
: Brian L Tuttle
Recorded Webinar

This webinar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2018. Areas also covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ens.....

$200.00
HIPAA vs SAMHSA (42 CFR Part 2)
HIPAA vs SAMHSA (42 CFR Part 2)
: Brian L Tuttle
Recorded Webinar

This lesson will be addressing how practice/business managers (or compliance offers) need to ensure their organization is complying with the Federal Substance Abuse and Mental Health Administration (SAMHSA) regulations (42 CFR Part 2) and how this differs from the HIPAA (Health Insurance Portability and Accountability Act) Privacy and Security Regulations. Both regulations carry significant civil and even c.....

$200.00
Reusable Test Designs Enable Testing More Thoroughly in Less Time
Reusable Test Designs Enable Testing More Thoroughly in Less Time
: Robin F. Goldsmith
: 20 December 2018
: 01 : 00 PM EST
: 90 Minutes

Would you like to be an instant testing expert, able to start testing effectively in new situations without delay? And would you like to spend more of your time running tests and less of your time creating the tests, while at the same time catching more defects, even in sprints’ very limited durations? Reusable test designs are a little-known but powerful test planning/design tool that makes it possible for.....

$149.00
Medical Device Software 62304 Compliance
Medical Device Software 62304 Compliance
: Carolyn Troiano
: 21 December 2018
: 01 : 00 PM EST
: 90 minutes

The webinar will leave you with the information needed to create and maintain good documentation that meets FDA compliance standards. You will learn about what must be done and what must not be done. In addition, you’ll learn about the various computer system validation deliverables and how to document them. This session will provide insight into the IEC 62304 standard as it is applied to medical device sof.....

$179.00
Putting Business and Analysis back in Business Analysis
Putting Business and Analysis back in Business Analysis
: Robin F. Goldsmith
: 09 January 2019
: 01 : 00 PM EST
: 90 Minutes

Do you sense business analysis and business analysts are falling behind? Is it as fulfilling as you’d like or expect, and do others give it the respect it needs and deserves? For instance, increasingly business analysts seem left out of Agile projects. These all can be signals business analysis is failing to provide adequate business value. It may merely reflect difficulty communicating value that actually .....

$149.00
Technical Writing Training
Technical Writing Training
: Robert Peoples
: 11 January 2019
: 01 : 00 PM EST
: 60 Minutes

Training in Technical Writing must begin with the realization that it is labor intensive. Someone learns to be a Technical Writer by creating Technical Documents. Simply stated, a Technical Writer learns to do by doing.In order to “Learn to do by doing,” we must define the function of Technical Writers. Exactly what is the job of Technical Writers? Technical Writers translate complex information into clear,.....

$149.00
How ISO/IEC 27001 Can Help Achieve GDPR Compliance & Reduce Data Breach Risks
How ISO/IEC 27001 Can Help Achieve GDPR Compliance & Reduce Data Breach Risks
: Robert E. Davis
: 24 January 2019
: 12 : 00 PM EST
: 60 Minutes

Organizational IT usage categorization can be either support transaction processing or decision-making. Transaction-based information systems process data for routine business activities, whereas a decision-based information system commonly advises managers and professionals in non-routine judgments. Accordingly, information systems represent an architectural component that collects data, processes transact.....

$149.00
Creating a Cyber Incident Response Program That Works
Creating a Cyber Incident Response Program That Works
: Michael C. Redmond
: 06 February 2019
: 01 : 00 PM EST
: 60 Minutes

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.Information Security, Governance & Risk, are all critical aspects of the planning and execution of the Information Sec.....

$149.00
On The Alert: Crafting An Effective Incident Response Plan (IRP)
On The Alert: Crafting An Effective Incident Response Plan (IRP)
: Robert E. Davis
: 11 February 2019
: 02 : 00 PM EST
: 60 Minutes

There are a variety of potential IT service threats that can convert to intentional or unintentional incidents requiring adequate IT service support. If restoring service normalcy as swiftly as possible and minimizing adverse impacts on entity operations are the primary incident management process goals, then IT support personnel achievement of expected performance levels ensures maintaining the highest pos.....

$149.00
Showing 1 to 15 of 16 (2 Pages)