- compliance
- Cybersecurity
- Payment Card Industry
- PCI DSS
- women in tech
- gender bias in tech
- women in payments
- women in tech statistics
- state of cybersecurity report
- security standards council
- ISACA cybersecurity report
- TrustRadius women in tech survey
- compliance
- Cybersecurity
- security strategy
- other
- hipaa security rule
- NIST Security Framework
- security strategic planning
- security frameworks
- security regulations
- compliance
- Cybersecurity
- healthcare
- PHI
- vCISO
- virtual ciso
- PII
- data breaches
- business associate security
- vendor security review
- business associate security review
- supplier security review
- compliance
- information security
- other
- security framework
- security governance program
- information security governance
- security governance committee
- compliance
- Cybersecurity
- HIPAA
- nist
- PCI-DSS compliance
- risk mitigation
- security risk assessment
- other
- Security Risk Status Reporting
- top ten security risks
- mitigating risks
- GLBA
- compliance
- Cybersecurity
- information security
- security strategy
- vCISO
- virtual ciso
- DontRiskItSecureIt
- other
- risk management
- security expertise
- security programs
- business solutions
- compliance
- telehealth
- patients right of access
- patient access
- healthcare regulation
- information blocking
- cures act
- ONC rule
- CMS rule
- EHI
- healthcare providers
- smartphone use
- electronic health information
- information blocking healthcare
- compliance
- Cybersecurity
- SSAE
- Regulations
- customer data
- service organizations
- cloud services
- SOC 1
- SOC 3
- data security
- service providers
- SOC 2
- compliance
- ethics
- compliance culture
- compliance
- Cybersecurity
- healthcare
- HHS
- HIPAA
- hipaa enforcement
- nist
- OCR
- 24By7Security
- Aarohi Talati
- Akash Deo
- Akhil Deo
- Amanda Spence
- Andrea Richard
- Anirudh Nadkarni
- Arjun Talati
- Benjamin Stukes
- Brian Gomez
- David Jost
- Deepali Shah
- Gabrielle Grau
- Gail Blount
- Kelly Alvarez
- Martin Palencia
- Michael Brown
- Nitin Chowdhry
- Parita Patel
- Prakul Neupane
- Randy Rodriguez
- Rema Deo
- Rupal Talati, HCISPP
- Sanjay Deo
- Yashica Nagpal
May, 3 2022
It wasn’t long ago that the first women began to enter the technology field, specifically in computer science and[…]
April, 26 2022
Every cybersecurity program or information security program needs a guiding light. A beacon that shows the way. A[…]
April, 5 2022
Security and privacy requirements are specified in a variety of federal regulations that apply to healthcare[…]
March, 8 2022
There are many benefits to having a security governance committee in your organization. In this blog, we examine some[…]
February, 8 2022
Keeping a watchful eye on your organization’s most serious security risks is a challenge in the best of circumstances.[…]
March, 9 2021
Businesses Can Now Hire a Chief information Security Officer On a Part-Time or Virtual Basis In the digital age, with[…]
November, 10 2020
Two new rules enacted in 2020 affect healthcare providers, insurers, and other healthcare industry constituents by[…]
October, 27 2020
We live and work in a society that has become extensively regulated. Regulations have evolved over time with the[…]
September, 1 2020
You hear the words "ethics" and "compliance" being used a lot in terms of businesses and whether they are doing the[…]
October, 17 2019
In the recent HIPAA conference organized by the Office for Civil Rights (OCR) and National Institute of Standards and[…]