Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

How to Perform HIPAA Risk Assessment

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires healthcare entities to implement policies and procedures to safeguard the privacy and security of the protected health information (PHI) of patients. One core requirement is to perform risk assessments. This article explains what a risk assessment is according to HIPAA and offers guidance about the steps involved.

CMMC Town Hall With Tom Tollerton, Dixon Hughes Goodman LLP | 1/26/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

CMMC Town Hall With John Ellis, DIBCAC & Bob Metzger, Rogers Joseph O'Donnell | 1/19/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

ISO27001:2021 - A New Way of Working

It has been a long time coming! The upgrade to the international standard for information security management systems, ISO27001:2013, is here (almost). Hallelujah! If you’re reading this article, then there’s a reasonable assumption that you know what ISO27001 is and you’re not going to be too worried about the back story. But let’s all be clear on a couple of points. The current version of the Information Security Management Standard is ISO27001:2013.

Ep 3 Frank W, Rich W, Kevin P - Securing the Digital Supply Chain

Securing the supply chain Ep. 3 - An amazing cast of security thought leaders - Rich Watson, Frank Weigel and Kevin Paige - 3 stellar security leaders who have an immense amount of experience in all sorts of companies and security program. We touch on FDIC, FIL guidance, GDPR impact, SDKs Ruby, Gems and oh so more!

Investigate Office 365 Security and Compliance Alerts in Octiga

Investigate possible Office 365 security and compliance alerts across all tenants systematically. Identify suspicious logins, external breaches, faulty inbox rules etc., and drill down into details like risk score, severity, country of the breach, connection type, & user ID, user type, to prioritise in-app remediation in clicks.

Bob Saget and open source license compliance

Unique open source licenses provide amusement for developers but they create extra work for legal teams overseeing a company’s IP. Several of my open source friends had the same reaction when they heard of the death of Bob Saget. Sadly, the actor/comedian passed away last week at a relatively young age, and with him went an increment of open source license risk. Wait… what?

Securing the Digital Supply Chain - Why are Investors interested in the digital supply chain

In this session for the Securing the Digital Supply Chain we talk to two very well known investors from Silicon Valley - Mahendra Ramsinghani (Secure Octane) and Cherian Mathew (Firebolt VC). We learn what drives the investment thought process for these two successful VCs and also hear what their perspectives are on cybersecurity, areas of interest, how to think about the market. Especially interesting are the thoughts on "Who gets affected" from a Digital Supply Chain perspective.