Hi [[ session.user.profile.firstName ]]

BAP Solution

  • Date
  • Rating
  • Views
  • GRC & IT Security Series: Tips and Tricks for FISMA, HIPAA, PCI, PII
    GRC & IT Security Series: Tips and Tricks for FISMA, HIPAA, PCI, PII
    Jeffrey Lush, CEO & Co-Founder, BAP Recorded: Jan 23 2019 31 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. The challenge: achieving compliance against regulations such as FISMA, HIPAA, CCPA, GDPR, PCI and PII, among others. In this webinar quickly learn best practices in Information Assurance to automate regulation and compliance to achieve accountable security using controls, policies and more than check-the-box actions.
    -Techniques to adopt to automate policy and control mapping
    -Steps to improve your ability to see the over health of your environment
  • GRC & IT Security Series: Healthcare Compliance & Security: Understanding HIPAA
    GRC & IT Security Series: Healthcare Compliance & Security: Understanding HIPAA
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Jan 9 2019 34 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable.HIPAA compliance remains critical for all healthcare organizations to combat security breaches. It is no surprise that the Healthcare industry remains one of the top targets for cyber-attacks. To avoid hefty fines and to gain the eagle eye view of the overall health of the organizations, GRC, IT Security and Compliance teams are quickly developing strategies to mitigate security breaches and achieve compliance to HIPAA. Join this bite-sized webinar to learn how organizations are tackling HIPAA.
    -Understand the policies and controls set forth in HIPAA
    -Understand how traditional compliance methods invite risk
    -Understand how continuous monitoring of HIPAA control health can eradicate failing health scores.
    -Discuss the innovations happening to drive automation of security breach policy and policy health oversight
    -See checks and balances to confirm implementation and policy health.
  • GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    Jeffrey Lush, CEO and Co-founder, BAP Paul Schoeny, VP Cybersecurity, BAP Recorded: Dec 12 2018 29 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. Often understanding the interpretation of SEC Cybersecurity Guidance, PII and PCI can be difficult and is often more of an art than a science. The objective of every organization is to provide cybersecurity protection and compliance with the standards established within these regulations. Join us to discover the steps you need to develop your cyber strategy and:

    -Understand the SEC, PII and PCI regulations
    -Focus on the security objectives all regulations are hoping to achieve
    -Learn how to leverage your existing cyber investment, augment the tools you already have for real-time threat detection
    -Understand how continuous monitoring of Policy control health can eradicate failing scores.
    -Automate cyber standards, policy, and compliance
    -Learn how to build and discover your cyber standard needs
    -Analyze and validate the implementation of those standards
  • GRC & IT Security Series: The Risk Management Framework for Today's GRC Concerns
    GRC & IT Security Series: The Risk Management Framework for Today's GRC Concerns
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Nov 28 2018 27 mins
    Join the GRC & IT Webinar Series for the byte-sized sessions aimed at making federal regulations understandable and actionable. What is the NIST Risk Management Framework (RMF)? Simply put: The RMF provides steps/activities to manage your organizations risk and to develop an effective information security program applied to legacy and new systems. Join BAP as we breakdown the six steps identified in the RMF and:
    -Understand what is your cyber policy
    -Break down the six steps found within RMF
    -Establish a baseline of control policies
    -Gain tips for accelerating your control and policy management needs
    -Automate Continuous Monitoring
    -Understand how continuous monitoring of NIST and RMF control health can eradicate failing health scores.
  • GRC and IT Security Series: Addressing GDPR Security Provisions
    GRC and IT Security Series: Addressing GDPR Security Provisions
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Nov 7 2018 26 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. The European Union’s General Data Protection Regulation (GDPR) has been active for several months. Organizations find themselves building or refining a repeatable and scalable infrastructure to manage GDPR security controls. Join us to learn:
    -GDPR’s impact on Security, Data Protection and Compliance Programs
    -Key importance of continuous monitoring to demonstrate ROPA and to reduce risk of fines
    -The steps for implementing and maintaining GDPR within your organization
    -How to align active threats with GDPR standards to know real-time if your organization is secure
    -Understand how continuous monitoring of GDPR control health can eradicate fines and failing GDPR assessment reports.
    -How to align the security objectives with NIST 800-53 security controls and map them to events, giving you complete accountable security.
  • GRC & IT Series: Using a NIST Based Approach to Align Cyber & Compliance
    GRC & IT Series: Using a NIST Based Approach to Align Cyber & Compliance
    Paul Schoeny, VP Cybersecurity, BAP Recorded: Oct 24 2018 27 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable.The NIST Cybersecurity Framework is quickly becoming the flagship program for managing cybersecurity risk. However, complying with the security standards can be a complicated process. Join us to take the guesswork out of NIST and learn:

    -To understand the security management provisions found in the NIST Framework
    -How to view the controls set forth in the Framework
    -How to measure your security success
    -To understand your IT risk tolerance
    -What teams should be involved and have responsibility?
  • How to Integrate Technology in Policy Gap Analysis
    How to Integrate Technology in Policy Gap Analysis
    Scott Lawler, LP3 and Jeffrey Lush, BAP Recorded: Aug 28 2018 40 mins
    How do organizations comply with complex mandates? This task is often overwhelming, and the solution is often expensive and may require outside help to conduct a lengthy gap analysis. The output is a long list of urgent actions to accomplish again this year just like last year—not helpful.

    The solution must be simpler with automation. In this webinar we’ll discuss:
    - How to automate gap analysis for continuous monitoring
    - Enabling policy implementation visibility for the first time
    - How to reduce the noise quickly to build a reputable cyber strategy
    - Validating continuously enterprise and system security policy enforcement
  • Controls, Baselines and Regulations, Oh My! Building Your Security Strategy
    Controls, Baselines and Regulations, Oh My! Building Your Security Strategy
    Jeffrey Lush Recorded: Jun 14 2018 37 mins
    Organizations of all size are continuously tasked with building, updating, or revitalizing their cybersecurity strategies. Breaking news stories of organizations being hacked splash across major news outlets headlines on an increasingly frequent basis. The question is how can you gain the strongest security infrastructure all while reducing costs and man hours?

    Join renowned security expert Jeffrey Lush of BAP in the first webinar in our Jumpstart Cybersecurity webinar series. This webinar will give you practical information to build, analyze and protect your organization.

    In this webinar you will be introduced to:

    -Understanding what a security baseline is and why is it important
    -Learning the difference between continuous monitoring and accountable security
    -Gaining information on mapping events to security controls
    -Understanding your level of risk
    -Preparing yourself for federal regulations such as DFARS, GDPR, HIPAA and more.

Embed in website or blog