Search Training Library


Developing a Comprehensive Security Program and Creating a "Culture of Security"

Geoff Fisher , John Halamka , Jigar Kadakia , Mitch Parker  •  Available Exclusively for Premium Members • 

The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks

Christopher Beier , Jigar Kadakia  •  Available Exclusively for Premium Members • 

Data Protection Strategies for Healthcare

Kate Borten , Leslie Sistla  •  Available Exclusively for Premium Members • 

Preparing for and Passing an OCR HIPAA Audit

Kate Borten , Mitch Parker  •  Available Exclusively for Premium Members • 

The Internet of Absolutely Everything, Connected Medical Devices and BYOD - Securing the Information They Access and the Information They Can Leak

Stephen L. Grimes  •  Available Exclusively for Premium Members • 

Cyber Kill Chain: Get-in, Stay-in and Act

Jim Rice , Jeremy Rissi , Arun Sood, PhD  •  August 31, 2015 @ 1:30 PM •  August 31, 2015 • 

Securing the Email Channel in Healthcare

Brian Westnedge  •  September 3, 2015 @ 3:30 PM •  September 3, 2015 • 

Mobile Banking: Empowering Banks to Protect Customers Against Online Fraud

Ken Jacobi , David Lott  •  September 8, 2015 @ 3:30 PM •  September 8, 2015 • 

A CISO's Guide to What Security Testing Tools Miss

Mike Pittenger  •  September 9, 2015 @ 1:30 PM •  September 9, 2015 • 

Healthcare Information Security Today: 2015 Survey Results and Analysis

Geoffrey Bibby , Michael Bruemmer , Marianne Kolbasuk McGee , Scott McLeod  •  September 9, 2015 @ 3:30 PM •  September 9, 2015 • 

The Enterprise at Risk: The 2015 State of Mobility Security

Tom Field , Kurt Roemer  •  September 10, 2015 @ 1:30 PM •  Available OnDemand •  September 10, 2015 • 

Cyber Insurance Checklist - What's Right for Your Risk?

Richard Bortnick , Sam Curry  •  September 15, 2015 @ 1:30 PM •  September 15, 2015 • 

Cybercrime Ecosystem: EVERYTHING for Sale

Etay Maor  •  September 17, 2015 @ 1:00 PM •  September 17, 2015 • 

Identity Theft: How the Name Game Has Changed

Johnny May  •  Available Exclusively for Premium Members • 


Premium Membership


Already a member?
Sign in.


Course Catalog

Everything you need to know about our webinars, including speaker bios, topics, and courses.

Download

Course Catalog

Everything you need to know about our webinars, including speaker bios, topics, and courses.

Download

CPE Partners