<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Anirudh Nadkarni

Anirudh Nadkarni
Anirudh Nadkarni holds a Bachelor of Arts degree with a major in History from the University of Florida. As a Senior Security Analyst at 24By7 Security, Inc., his main focus in on compliance. Anirudh’s role includes performing on-site Security Risk Assessments, assisting in the development of Privacy and Security Policies & Procedures, and conducting HIPAA training for healthcare providers and their staff. Anirudh is certified as a Health Care Information Security and Privacy Practitioner (HCISPP) from ISC2, HITRUST Certified CSF Practitioner (CCSFP) and as a Certified Data Privacy Professional (CDPP) from Network Intelligence. Sign up for the 24By7Security blog and follow Anirudh’s musings.
Find me on:

Recent Posts

Who Needs to Comply With CMMC?

As of Nov 2021, CMMC 2.0 was introduced and the information below may not apply in its entirety. Before we discuss who[…]

Breach Risk Analysis: A Four-Step Plan

Data breaches have long been a nuisance for many industries, including healthcare and financial services. In the age of[…]

Does Your Business Need to Comply with The California Consumer Privacy Act?

When the European Union’s General Data Protection Regulation (GDPR) came into effect, the stipulations of this act had[…]

How Often Should You Review Your Policies and Procedures?

When was the last time your organization reviewed its information security policies and procedures? Although many[…]

Invoice Scams - The New Emerging Threat in Cybersecurity

Phishing scams have long been an effective social engineering technique used by criminals to adversely affect[…]

How Ethical Hacking can Help you Secure your Business

Is Ethical Hacking the defense strategy your business needs? What is Ethical Hacking? Hacking is a term that is often[…]

Information Technology Is Not Information Security - Why Both Need to be in Place to Protect your Data

Table of Contents: Why IT and IS both need to be in place to protect your data Lack of Awareness surrounding[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]
No More Posts
Subscribe to our Blog!