Speaker Profile
MICHAEL C. REDMOND
Dr. Michael C. Redmond, PhD is Consultant, Speaker, and Author. Her certifications Include MBCP, FBCI, PMP, CEM ISO 27001 Lead Implementer and Lead Auditor, as well as many other ISO certifications. Michael also conducts ISO Certification Implementation and Audit Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. She has consulted in the area of Cyber Security for clients in the areas of Healthcare, Insurance, Financial, and Manufacturing. Her projects have included SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM) (CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training, and Testing Audit of CSIRT programs and documentation Information Security Programs and Implementation Michael has consulted in the fields of Business Continuity and Disaster Recovery in the areas of Healthcare, Insurance, Financial, Manufacturing, Education, and Government. She has 2 books which are coming out in 201yand are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book
Michael C. Redmond
Recorded Webinar
60 Minutes
Auditing Information Security Using ISO 27001
ISO 27001 describes how to manage information security in a company. According to its documentation. ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..
Michael C. Redmond
Recorded Webinar
90 Minutes
HIPAA 2023 - Compliance Requirements, Do's and Don'ts
This 90-minute webinar will discuss how practice/business managers (or compliance offers) can get their HIPAA house in order before an audit.It will also address changes under the Omnibus Rule, new congressional mandates, and any other applicable updates for 2023 and beyond along with changes relating to Covid and Information Blocking under the Cures Act (do’s and don’ts).There are an enormous amount of iss..
Michael C. Redmond
Recorded Webinar
90 Minutes
Roles and Responsibilities of a HIPAA Privacy and Security Officer
This webinar will be addressing the Roles and Responsibilities of a HIPAA Privacy and Security Officer There are an enormous amount of issues and risks for covered entities and business associates these days – we will speak to the most common violations and fines – and how to best avoid fines and headaches.HIPAA includes a Security Rule that establishes safeguards for organizations holding electronically-st..
Michael C. Redmond
Recorded Webinar
90 Minutes
ISO 20700 - Management Consultancy Services
The standard focuses on five key areas of project management: governance, planning, implementation, monitoring and control, and closure. Governance is the process by which program objectives are established and monitored to ensure that projects remain on track. Planning encompasses resource estimation, scheduling, and risk management activities. Implementation includes budgeting, organization structure desi..
Auditing Business Continuity Plans According to ISO 22301
Successful business continuity planningInvolves the entire organization Requires clear and consistent communication Encompasses how employees will communicate, where they will go, and how they will keep doing their jobsPrepares the organization for disruptive eventsWhy is BCP Important? 61% of companies surveyed had to invoke their BCP 43% had to invoke it more than onceKey Causes: Natural Disaster, Power O..
Creating a Cyber Incident Response Program That Works
The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits, and protects brand reputation.Information Security, Governance & Risk, are all critical aspects of the planning and execution of the Information Se..
Creating a Robust IT Governance Program
IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention, and disaster recovery, among others. They're also under pressure from shareholders, stakeholders, and customers.To..
How to Apply ISO 27001 Principles to Enterprise Risk Management In 2018
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your organization you can ensure robust security for your organization's vital inf..
Information Cyber Security Planning for Governance, Risk and Compliance (GRC) Framework - Organization and Responsibilities
Information Cyber Security Planning for Governance, Risk and Compliance (GRC) is essential in this world of new technologies, cyber events, natural and manmade disasters. GRC refers to a company's coordinated strategy for managing the broad issues of corporate governance, enterprise risk management (ERM) and corporate compliance with regard to regulatory requirementsEnterprise IT Governance, Risk, Complianc..
Risk Assessment and Business Impact Analysis using PMI and ISO/IEC 21500 Project Management Methodologies
Learn to properly use Project Management Principles to prepare for an impact on the business for any organization. We will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review the continuity planning program. Areas such as Project Management of IT Outsourcing and other risks will be cov..