In this 45 minute webinar, ControlCase will discuss the following: What is GDPR? How will it impact me? How can I become compliant? What is the timeline? What are consequences if not met?
PCI DSS Compliance in the Cloud – September 2017
In this 45 minute webinar, ControlCase will discuss the following: About the cloud About PCI DSS PCI DSS in the cloud How to keep sensitive data secure as you move to the cloud Q&A
Vendor Management for PCI DSS, HIPAA, and FFIEC – August 2017
In this 45 minute webinar, ControlCase will discuss the following: Requirements for PCI DSS, HIPAA, Business Associates, FFIEC and Banking Service Providers What is Vendor Management Why is Continual Compliance a challenge in Vendor Management How to mix technology and manual processes
PCI DSS Version 3.2
The 45-minute webinar will discuss the ControlCase interpretation of changes/clarifications in the context of PCI DSS V3.2 standard Overview of changes and clarification Additional requirements for service providers Additional requirements for change control processes Multifactor
Integrated Compliance – July 2017
This 45 minute webinar will discuss the following: About PCI DSS, ISO 27001, NERC, HIPAA, and FISMA Best Practices and Cloud Implications for Comprehensive Compliance within IT Standards/Regulations Challenges in the Comprehensive Compliance Space Q&A
PCI DSS Version 3.2 – June 2017
The 45-minute webinar will discuss the ControlCase interpretation of changes/clarifications in the context of PCI DSS V3.2 standard Overview of changes and clarification Additional requirements for service providers Additional requirements for change control processes Multifactor
Healthcare Compliance: HIPAA and HITRUST – May 2017
In this 45 minute webinar, ControlCase will discuss the following: Healthcare compliance in general What is HIPAA What is HITRUST How do they relate? Advantages of being HITRUST certified
PCI DSS and PA DSS Compliance – April 2017
In this 45 minute webinar ControlCase will discuss the following in the context of PCI DSS and PA DSS Network Segmentation Card Data Discovery Vulnerability Scanning and Penetration Testing Card Data Storage in Memory Q&A