A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


All of Your Compliance Needs with One Methodolgy - Jim Czerwonka Louisville InfoSec 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

All of Your Compliance Needs with One Methodolgy
Jim Czerwonka
Louisville InfoSec 2014

HIPAA, PCI, GLBA, CIP, SEC, NERC, SOX, Kentucky House Bill 5 and 232 and many, many, more! With how many of these acronyms must your organization be in compliance? Understanding the requirements of each can take years. Thankfully, there is one set of guidance which is as the basis of most compliance regulations. Learn how a NIST-based approach can simplify your compliance efforts and be used in building your audit program. Recent issues that underscore the need for such regulations and implementation of information security and audit controls. * NIST and how it is the basis for most compliance regulations. * Core components of NIST and the best practices organizations should have regardless of compliance. Mr. Czerwonka has significant tactical and management experience as a compliance and audit, information technology, and business process professional. His industry experience includes healthcare, manufacturing, “Big 4″ IT audit and management consulting, and financial services. He has significant experience managing and executing on enterprise wide IT infrastructure, security, business process, and compliance projects for PCI, HIPAA, GLBA, FFIEC, and SOX information technology and security regulations and standards. Mr. Czerwonka has performed and managed numerous IT risk assessments, internal control assessments, compliance cost benefit analysis, and implemented both manual and automated systems to improve the compliance collecting and reporting processes.

Back to Louisville InfoSec 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast