How to manage the ongoing information security requirements

Instructor: Kevin Beaver
Product ID: 700229
Training Level: Basic to Intermediate
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-565-8542


Read Frequently Asked Questions

In this IT compliance training learn how to manage the ongoing information security requirements.

Many business leaders and IT managers believe they are in compliance with all the federal and state information security regulations affecting them. That may be true but at what cost to the organization? Being compliant in a defensive context and proactively managing compliance as an ongoing business process are very different from each other. Unfortunately, more organizations do more of the former and aren’t sure how to do the latter. Reducing the costs of information security compliance requires everyone speaking a common language within the organization, utilizing the proper tools, and managing information security at a high enough level to reasonably satisfy all the regulations at once.

Areas Covered in the Seminar:

  • Defining compliance in your business
  • Getting the right people involved once and for all
  • Looking at information risks differently
  • Reigning in all your requirements
  • Closing the loop on critical change management processes
  • Using compliance tools that will help relieve the pain of regulatory requirements

Who Will Benefit:

Anyone responsible for the ongoing compliance and IT governance needs of within their business - regardless of the size of the organization:

  • IT managers
  • Information security managers
  • Compliance officers/managers
  • Business executives ultimately responsible for compliance
  • Information security consultants
  • Information security auditors

Instructor Profile:

Kevin Beaver, CISSP, is an independent information security consultant, author, and expert witness with over 18 years of experience in IT. He focuses his work on performing information security assessments related to compliance and IT governance. Kevin has authored or co-authored six books on information security including the highly successful ethical hacking book Hacking For Dummies, 2nd edition and Hacking Wireless Networks For Dummies (both by Wiley) as well as, The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). In addition, Kevin is a contributing author and editor of the book Healthcare Information Systems, 2nd edition by Auerbach Publications, technical editor of the book Network Security For Dummies by Wiley Publishing, and technical editor for over a dozen books and whitepapers for
In addition to his books, Kevin writes and produces practical information security advice called Security on Wheels for IT professionals on the go. He is also a regular columnist and information security advisor for various TechTarget websites including,, and In addition, his information security work has been published in Information Security Magazine,, and CSI's Computer Security ALERT newsletter. Kevin is a frequent and top-rated speaker on information security at various conferences for RSA, CSI, TechTarget, IIA, and SecureWorld Expo.

Kevin earned his bachelor’s degree in Computer Engineering Technology from Southern Polytechnic State University and his master’s degree in Management of Technology from Georgia Tech.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
ComplianceOnline Medical Device Summit 2017

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed