Information security compliance

You may need to do a quick third-party registration to access certain ones.

  • The future of compliance policy management
  • Sensible HIPAA Security Compliance for Business Associates & Subcontractors
  • Ensuring PCI DSS Compliance in the Cloud
  • Managing network security threats with an ERM strategy
  • Why you need to create an ESI strategy – ESI, or Electronically Stored Information, strategies have become mandatory over the past few years. This webcast focuses on how to approach the requirements ESI is designed to facilitate including e-discovery of documents for legal cases. It will also address how to organize and establish ownership of data groups, how to create a system that accesses knowledge efficiently, and how to maintain the system so it stays in compliance with various regulations.
  • How to manage the ongoing information security requirements for SOX, HIPAA, GLBA and other key regulations – a single solution – Many business leaders and IT managers believe they are in compliance with all the federal and state information security regulations affecting them. That may be true but at what cost to the organization? Being compliant in a defensive context and proactively managing compliance as an ongoing business process are very different from each other. Unfortunately, more organizations do more of the former and aren’t sure how to do the latter. In this paid webcast hosted by ComplianceOnline, you’ll learn that reducing the costs of information security compliance requires everyone speaking a common language within the organization, utilizing the proper tools, and managing information security at a high enough level to reasonably satisfy all the regulations at once.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)


I’ve written/co-written 12 books on information security including: