IT and PCI Compliance

IT and PCI Compliance
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?
A Leer, A Pat, A Joke, A Gesture, An Innuendo, A Kiss: Are You Prepared To Be the Next Social Media Blitz, Identified on #MeToo, or a Headline in the Newspaper?

Harvey Weinstein, Matt Lauer, Charlie Rose, Al Franken, Garrison Keillor, members of Congress, and v.....

$200.00
GDPR, Are You Ready?
GDPR, Are You Ready?

What is the regulation called GDPR? Is your business ready for the change? How do these new laws aff.....

$200.00
HIPAA Audits – an Insiders Perspective
HIPAA Audits – an Insiders Perspective

I will be speaking to real life audits conducted by the Federal government for Phase 2 and beyond (I.....

$200.00
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018

ISO 27001 describes how to manage information security in a company. According to its documentation,.....

$200.00
PM Skills for BAs-Planning, Estimating, and Controlling BA Work
PM Skills for BAs-Planning, Estimating, and Controlling BA Work

Is poor project management impacting your effectiveness? What can you do about it? How’s that workin.....

$200.00
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies

Learn to properly use Project Management Principles to prepare for an impact to the business for any.....

$200.00
HIPAA training for the Compliance Officer
HIPAA training for the Compliance Officer

This webinar will be addressing how practice/business managers (or compliance offers) need to get th.....

$200.00
HIPAA vs SAMHSA (42 CFR Part 2)
HIPAA vs SAMHSA (42 CFR Part 2)

This lesson will be addressing how practice/business managers (or compliance offers) need to ensure .....

$200.00
Proactive Software Quality Assurance(tm) Overcomes Traditional 'Traffic Cop' SQA Resistance
Proactive Software Quality Assurance(tm) Overcomes Traditional 'Traffic Cop' SQA Resistance

Is your QA/testing resisted? Is “QA” in your title or role, but all you do is testing or act like a .....

$155.00
Strike Back Against Encrypting Ransomware
Strike Back Against Encrypting Ransomware

Ever since the original CryptoLocker was released, in September 2013, the malware landscape has chan.....

$155.00
Leveraging the NIST 800-53 Controls for Security, Compliance, & Privacy
Leveraging the NIST 800-53 Controls for Security, Compliance, & Privacy

The National Institute of Standards and Technology (NIST) Special Publication 800-53, Security and P.....

$155.00
Hacked Again - Protecting Your Small Business from Ransomware
Hacked Again - Protecting Your Small Business from Ransomware

This course will provide a thorough overview of ransomware, how attacks are launched, and best pract.....

$155.00
Business Continuity Management: Architect and Implement Solution
Business Continuity Management: Architect and Implement Solution

Learn to properly prepare for an impact to the business for any organization. We will cover how to i.....

$155.00
Tobacco Industry Trends for Computer Systems Regulated by FDA
Tobacco Industry Trends for Computer Systems Regulated by FDA

An effective and compliant strategy is critical to any FDA-regulated organization, including those i.....

$195.00
Managerial Primer for Ensuring Information Security
Managerial Primer for Ensuring Information Security

Planning and organizing are essential to organizational cohesiveness. ISG usually occurs at differen.....

$155.00
Showing 1 to 15 of 18 (2 Pages)