Speaker Profile
MICHAEL C. REDMOND
Dr. Michael C. Redmond, PhD is Consultant, Speaker, and Author. Her certifications Include MBCP, FBCI, PMP, CEM ISO 27001 Lead Implementer and Lead Auditor, as well as many other ISO certifications. Michael also conducts ISO Certification Implementation and Audit Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. She has consulted in the area of Cyber Security for clients in the areas of Healthcare, Insurance, Financial, and Manufacturing. Her projects have included
SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM)
(CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training, and Testing
Audit of CSIRT programs and documentation
Information Security Programs and Implementation
Michael has consulted in the fields of Business Continuity and Disaster Recovery in the areas of Healthcare, Insurance, Financial, Manufacturing, Education, and Government. She has 2 books which are coming out in 201yand are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book

Michael C. Redmond
May 13 2025
01 : 00 PM EST
60 Minutes
ISO/IEC 27001 Information Security Management Systems
This 60-minute webinar offers a concise yet comprehensive exploration of ISO/IEC 27001 Information Security Management Systems. It introduces participants to the essential principles and practices that make ISO/IEC 27001 the backbone of robust data security for organizations worldwide. The session will focus on understanding the key requirements of the ISMS framework, including risk management, leadership c..

Michael C. Redmond
May 28 2025
01 : 00 PM EST
60 Minutes
ISO 9001 Quality Management
This webinar provides a comprehensive overview of ISO 9001, its key principles, and how organizations can use it to meet their quality objectives. During this 90-minute session, you will gain deep insights into the framework of ISO 9001, exploring its process-based approach and risk-based strategies. Participants will learn how to interpret the standard’s requirements and apply them practically in their org..

Michael C. Redmond
June 17 2025
01 : 00 PM EST
60 Minutes
ISO/IEC 27005 Information Security Risk Management
This 60-minute webinar will provide an in-depth understanding of ISO/IEC 27005 and its importance in today's risk-driven digital landscape. Participants will explore the key concepts of information security risk management, including how to systematically identify, analyze, and treat risks aligned with organizational objectives.The session will cover a range of risk assessment methodologies outlined by ISO/..

Michael C. Redmond
July 15 2025
01 : 00 PM EST
60 Minutes
Internal Auditing to MDSAP Concepts and Practices in Aligning the Internal Audit Program
The Medical Device Single Audit Program (MDSAP) is a global initiative designed to standardize regulatory audits for medical device manufacturers. Meeting MDSAP requirements is critical for companies seeking to sell their products in participating countries. This session will uncover how internal audits play a pivotal role in ensuring compliance, enabling organizations to improve the quality of their proces..

Michael C. Redmond
August 12 2025
01 : 00 PM EST
60 Minutes
HIPAA 2025 - Upcoming Changes HIPAA
The 2025 HIPAA updates are designed to address contemporary challenges in the healthcare landscape, focusing on technological changes, expanded patient rights, and tightening compliance expectations. Organizations need to adapt swiftly and efficiently to avoid penalties and maintain operational integrity.This session offers a comprehensive look at the upcoming HIPAA changes, breaking down the new rules’ imp..

Michael C. Redmond
Recorded Webinar
60 Minutes
Auditing Information Security Using ISO 27001
ISO 27001 describes how to manage information security in a company. According to its documentation. ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..

Michael C. Redmond
Recorded Webinar
90 Minutes
HIPAA 2023 - Compliance Requirements, Do's and Don'ts
This 90-minute webinar will discuss how practice/business managers (or compliance offers) can get their HIPAA house in order before an audit.It will also address changes under the Omnibus Rule, new congressional mandates, and any other applicable updates for 2023 and beyond along with changes relating to Covid and Information Blocking under the Cures Act (do’s and don’ts).There are an enormous amount of iss..

Michael C. Redmond
Recorded Webinar
90 Minutes
Roles and Responsibilities of a HIPAA Privacy and Security Officer
This webinar will be addressing the Roles and Responsibilities of a HIPAA Privacy and Security Officer There are an enormous amount of issues and risks for covered entities and business associates these days – we will speak to the most common violations and fines – and how to best avoid fines and headaches.HIPAA includes a Security Rule that establishes safeguards for organizations holding electronically-st..

Michael C. Redmond
Recorded Webinar
90 Minutes
ISO 20700 - Management Consultancy Services
The standard focuses on five key areas of project management: governance, planning, implementation, monitoring and control, and closure. Governance is the process by which program objectives are established and monitored to ensure that projects remain on track. Planning encompasses resource estimation, scheduling, and risk management activities. Implementation includes budgeting, organization structure desi..

Auditing Business Continuity Plans According to ISO 22301
Successful business continuity planningInvolves the entire organization Requires clear and consistent communication Encompasses how employees will communicate, where they will go, and how they will keep doing their jobsPrepares the organization for disruptive eventsWhy is BCP Important? 61% of companies surveyed had to invoke their BCP 43% had to invoke it more than onceKey Causes: Natural Disaster, Power O..

How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..

Information Cyber Security Planning for Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
Information Cyber Security Planning for Governance, Risk and Compliance (GRC) is essential in this world of new technologies, cyber events, natural and manmade disasters. GRC refers to a company's coordinated strategy for managing the broad issues of corporate governance, enterprise risk management (ERM) and corporate compliance with regard to regulatory requirementsEnterprise IT Governance, Risk, Complianc..

Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Learn to properly use Project Management Principles to prepare for an impact on the business for any organization. We will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review the continuity planning program. Areas such as Project Management of IT Outsourcing and other risks will be cov..