Cybersecurity Audit – Top 5 Findings

Please note CPE is not available for webinars on-demand. CPE is only available for live events. Presented by: Carly Devlin and Mark Stoudemire Due to highly publicized data breaches and increased cyber threats, there is an increasing focus on cybersecurity risk management and controls. Whether it’s an internal audit or 3rd party assessment, many organizations […]

Introduction to the NIST SP 800-171 Framework

Presented By: Richard Collins and Chris Heitkamp In an effort to improve data protection, regulators are increasingly requiring organizations to comply with IT Security best practices. From Department of Defense (DoD) contractors to colleges and universities, NIST SP 800-171 has been breaking out as the baseline standard for such initiatives. This presentation will provide an […]

Employees are ready to quit – Is your engagement strategy ready?

K2 and K3 Filing Requirements

Recent studies show that employees are quitting their jobs at an increasing rate. A number of factors contribute to this, but poor employee engagement is cited as a root cause. How engaged are your employees and what factors drive their expectations and performance inside the workplace? Uncovering the answers to these questions will help you […]

Key Risks Pertaining to an Audit Committee

Presented by: Jenna Skop and Seth Rensberger With regulatory, process, and technology changes occurring at a rapidly increasing rate, how does a company’s Audit Committee ensure they are focusing their attention on the key risks of their organization? The webinar will discuss how: The composition of the Audit Committee has needed to adapt to meet […]

SOC and the Cybersecurity Threat

Organizations are under increased pressure to demonstrate that they are managing cybersecurity threats, and that they have effective processes and controls in place to detect, respond to, mitigate and recover from breaches and other security events. With these threats in mind, the AICPA has developed a new System and Organization Controls (“SOC”) for Cybersecurity engagement. […]

General Data Privacy Regulation

In response to recent data breaches and personal information disclosures, the European Union has implemented the General Data Privacy Regulation (GDPR) in an attempt to protect member states and their citizens’ privacy. While this regulation was intended to increase information security measures and transparency on data collection methods in the EU, many international companies have […]

Three Lines of Defense in Effective Risk Management

In this day and age, it’s not uncommon to find internal auditors, enterprise risk management specialists, compliance officers, fraud investigators, and other risk and control professionals working together to help their organizations manage risk. Each of these specialties has a unique perspective and specific skillset that can be invaluable to the organization, but since risk […]

How the new tax law affects individuals

NOTE: CPE is only available for live events, not webinars played on demand at a later date. Major tax reform has happened. Now the question is, what will that mean for you and your personal taxes? In this webinar CSH’s Mark Gaudet and Larry Powell discuss what you need to know about the new tax law and […]

The Wild Wild West- How Ransomware is Changing the Face of Cyber Security

Presented by: Mark Stoudemire & Luke Nesman Ransomware has been around since 1989 but in 2013 cyber criminals took it pro, and companies all around the world have been feeling and seeing the effects for the last 4 years. The internet has truly become the wild wild west of the 21st century and evil is […]

Making Sense of NIST & Other IT Security Frameworks

HIPAA, PCI, ISO, NIST… Understanding the alphabet soup that is security and regulatory compliance is becoming increasingly complex, and most organizations focus only on maintaining compliance rather than using these frameworks as the foundation of a comprehensive security program. In particular, the National Institute of Standards and Technology (NIST) provides many helpful guides that provide […]

Get in Touch.

What service are you looking for? We'll match you with an experienced advisor, who will help you find an effective and sustainable solution.

  • Hidden
  • This field is for validation purposes and should be left unchanged.