Cybersecurity is anything but a static approach; it is an ever-changing process that evolves as threat actors do. No single audit alone can keep you ready. Doing just one penetration test can’t keep you secure. It takes layers of security and a holistic approach to get a full understanding of your organization's unique threat surface.
Taking any kind of “set it and forget it” or “check the box” mentality to cybersecurity leaves your organization and customers susceptible to a cyberattack. New vulnerabilities are released every day, and new exploits shortly follow.
In this webinar, “What Business Leaders Need To Know About Cybersecurity Preparedness”, we will discuss and demystify common misconceptions about cybersecurity, the dangers of taking a static approach to cybersecurity, and how to properly map out your organization’s vulnerabilities to any remaining security gaps.
WHY SHOULD YOU ATTEND?
Cybersecurity is everyone’s responsibility and executives at organizations need to set a culture of cybersecurity from the top.
AREA COVERED
- Define cybersecurity
- Why care about cybersecurity
- Evolution of Cybersecurity Threats and Risks
- Recent cybersecurity breaches/incidents
- Privacy and Security Laws and Regulations
- Perform a cybersecurity risk assessment
- Protecting Your Most Valuable Assets
LEARNING OBJECTIVES
- Participants will have a better understanding of how the cyber and digital threat landscape has evolved over the past few years.
- Participants will have a better understanding of what cybersecurity compliance means and the importance of implementing a cybersecurity compliance program.
- Participants will leave the session with practical steps for building out their cybersecurity program.
- Participants will understand how to identify common gaps left exposed by ‘convenience-first' compliance practices.
- Participants will understand how to locate what information is publicly exposed that an attacker can access right now.
- Participants will understand how to understand how exploitation of the technologies you use can occur.
WHO WILL BENEFIT?
- Chief Information Security Officers
- Chief Technology Officers
- Chief Information Officers
- Privacy Officers
- Security Managers
- Compliance Managers
Cybersecurity is everyone’s responsibility and executives at organizations need to set a culture of cybersecurity from the top.
- Define cybersecurity
- Why care about cybersecurity
- Evolution of Cybersecurity Threats and Risks
- Recent cybersecurity breaches/incidents
- Privacy and Security Laws and Regulations
- Perform a cybersecurity risk assessment
- Protecting Your Most Valuable Assets
- Participants will have a better understanding of how the cyber and digital threat landscape has evolved over the past few years.
- Participants will have a better understanding of what cybersecurity compliance means and the importance of implementing a cybersecurity compliance program.
- Participants will leave the session with practical steps for building out their cybersecurity program.
- Participants will understand how to identify common gaps left exposed by ‘convenience-first' compliance practices.
- Participants will understand how to locate what information is publicly exposed that an attacker can access right now.
- Participants will understand how to understand how exploitation of the technologies you use can occur.
- Chief Information Security Officers
- Chief Technology Officers
- Chief Information Officers
- Privacy Officers
- Security Managers
- Compliance Managers
Speaker Profile

Blaise has over 14 years of experience in Security Compliance and Risk Management and started his career with KPMG. He joined A-LIGN in 2013 and started the Healthcare Services practice in 2015. Having a very unique background as a CPA, CISA, CCSK, and CCSFP, Blaise has performed over 500 SOC attestation reviews and over 300 HITRUST/HIPAA assessments for Global 1000 and Fortune 500 clients in various industries. Blaise is also a sought-after speaker and has delivered several speaking engagements at well-renowned conferences such as HIMSS, HITRUST, and ISACA.
Upcoming Webinars

Cleanroom, Microbiology and Sterility Assurance Practices f…

Workplace Investigations 101: How to Conduct your Investiga…

Successfully Negotiating the Labor Agreement

Wage And Hour Laws: Ensuring Compliance With The Fair Labor…

Understanding the incredible uses and fallbacks of ChatGPT

5 Key Components of Good Manufacturing Practices to obtain …

How to Manage Conflict in the Workplace

Neutralizing Harassment - How to Promote the Proactive Pers…

Using Better Managerial Decision Making - to get great resu…


Changing Behavior: Why Rewards and Punishments Often Aren't…

Hybrid Workplace: 10 Best Practices to Manage Your Team’s P…

Human Error Reduction Techniques for Floor Supervisors

Using Stay Interviews To Improve Employee Retention & Engag…

Excel - Pivot Tables - The Key To Modern Data Analysis and …

Using High-Performance Coaching for Managers to Address Per…

Form W-9 Compliance to Avoid Penalties: TIN Verification, B…



FDA Technology Modernization Action Plan (TMAP) and Impact …


FDA Audit Best Practices - Do's and Don'ts

Stay Interviews: A Powerful and Low-Cost Employee Engagemen…

Become an excellent Critical Thinker to greatly improve you…


Learn the Do's and Don'ts of Opening Business Bank Accounts

Project Management for HR, Administrative Professionals, an…

2-Hour Virtual Seminar on How to Conduct an Internal Harass…

Re-imagine Finance & Accounting Made Simple. Three Webinars…

Performance of Root Cause Analysis, CAPA, and Effectiveness…

Writing Effective 483 and Warning Letter Responses

Dealing With Difficult People In Life & Work