E-Learning Compliance Training Library of Online Courses
|
|
|
- David Harris
- 10 years ago
- Views:
Transcription
1 E-Learning Compliance Training Library of Online Courses What Are Your Training Requirements? ecfirst provides online compliance training and quality improvement training courseware to hospitals, teaching facilities, medical schools, and other health care entities. The ecfirst Compliance Learning Library contains expert courseware content in the areas of: General Compliance Research Compliance Quality Improvement Accreditation Sexual Harassment ecfirst elearning for healthcare training courses assist healthcare compliance and quality improvement administration in the complex task of providing critical regulatory compliance information to a large, distributed, multi-shift workforce. Our unique on-line courseware provides timely and engaging, full motion video of real-life scenarios, interactive questions and answers, student tracking, and comprehensive management reporting. GENERAL COMPLIANCE SUITE ONLINE COURSES The General Compliance Suite consists of several multimedia, interactive courses. The courses are: Fraud Awareness: Professional Compliance Fraud Awareness: Corporate Compliance HIPAA Compliance o HIPAA Compliance For Health Plans/Other Payors All Rights Reserved ecfirst
2 Deficit Reduction Act: False Claims & Employee Protections Courseware Board of Directors/Senior Management Presentation Toolkit (Corporate Compliance: Corporate Responsibility) Each course is available individually, as part of the General Compliance Suite or as part of The Compliance Learning Library. RESEARCH COMPLIANCE SUITE ONLINE COURSES Research Compliance in the area of clinical and basic research has become a formidable and demanding undertaking. Research organizations have come under scrutiny from Federal and State lawmakers and are challenged to assure compliance with constantly changing rules and regulations. Large organizations with excellent reputations have been subject to program suspensions and charges of fraud, and have been assessed multi-million dollar fines. Research Compliance & Research Integrity - A single individual or a breakdown in simple procedures can cause a large problem for an entire organization, throwing expensive and vital research programs into disarray. Research organizations must protect themselves by educating their staff on complex and sometimes confusing government regulations, and by familiarizing them with institutional policies and procedures. This multimedia suite of courses is for all staff directly involved in basic or clinical research such as principle investigators, lab personnel, administrators, coordinators, and data handlers. It is also for staff who serve on institutional review boards (IRB), boards of directors, institutional executives, etc. Ultimately, the information contained in the courses is of vital importance to all medical research professionals and support personnel whose work is funded by government, foundation or other sponsor monies or falls under the auspices of government oversight agencies. The Research Compliance Courseware Titles are: Grants & Contracts Human Subjects Conflicts of Interest and Scientific Misconduct Professional Relationships and Data Issues QUALITY IMPROVEMENT ONLINE COURSES Continuous quality improvement is of increasing importance as public reporting of quality data and rewarding performance activities become more prevalent. Staff and administrators have the key role in monitoring, implementing and improving hospital care to ensure that it is safe, beneficial, patient centered, timely, efficient and equitable. An organizational commitment to quality improvement must contain an effective communication mechanism to create a successful enterprise-wide commitment. This Online Multimedia Suite of Quality Improvement training courses will: All Rights Reserved ecfirst
3 Educate the staff, physicians, nurse executives and other clinical leaders in the critical role they play in achieving quality by engaging them in quality improvement efforts Focus staff and administrators on healthcare outcomes Focus the entire organization on patient safety Create a culture of safety by engaging the entire staff in patient safety and quality improvement projects Focus staff on their role in contributing to a system of performance measurement and quality improvement to produce credible results to enable an evaluation of the organization's effectiveness. Articulate specific policies, procedures and expectations of the staff's involvement in organization wide quality Focuses hospital administration and staff on the analysis and improvement of quality of care measurements and reporting The Quality Improvement Courseware titles include: Patient Safety Reducing Medication Errors Infection Control Organizational Performance Improvement Competency for Quality Care Patient Rights Patient Education Documentation for Quality Care ACCREDITATION ONLINE COURSES The entire accreditation survey process changed radically in This new process can involve every member and department of your organization. These ten online multimedia courses combine video scenarios with audio, text and interactive exercises to present vital accreditation topics through short modules in an engaging and interesting format. Full administrative reports are available that provide detailed training status information for each staff member. Accreditation courseware titles include: The Joint Commission Accreditation Process and Tracer Methodology Patient Safety Reducing Medication Errors Bioterrorism and Disaster Preparation Infection Control Organizational Performance Improvement Competency for Quality Care Patient Rights All Rights Reserved ecfirst
4 Patient Education Documentation for Quality Care SEXUAL HARRASSMENT PREVENTION ONLINE COURSE Sexual harassment has been identified as a major challenge facing health care systems today. The reasons for this vary but research indicates that health systems experience an especially high rate of sexual harassment incidents. In one large survey almost 48 percent of all women physicians reported having experienced gender-based harassment, and 37 percent reported sexual harassment. Strong new and existing laws, lead by California, require education for all staff and management to understand what sexual harassment is and how to prevent it from occurring. The risk is great and facilities need to have a comprehensive education program in place. This interactive, multimedia courseware contains healthcare specific scenarios and situations that every healthcare worker will relate to. CONTACT INFORMATION For a customized proposal to meet your specific requirements, please contact Lorna Waggoner, Director of Business Development at: E: [email protected] P: x17 About ecfirst ecfirst delivers world-class information security, regulatory compliance solutions and its professional services team enables businesses address IT staffing challenges every day. With over clients, ecfirst was recognized as an Inc. 500 business America s Top 500 Fastest Growing Privately Held Business in 2004 our first year of eligibility. ecfirst assists organizations with their compliance initiatives for a secure information infrastructure that is compliant with regulations such as PCI DSS, HIPAA, Sarbanes-Oxley, ISO 27002, or federal and state legislations. ecfirst serves a Who's Who client list that includes technology firms, numerous hospitals, state and county governments, and hundreds of businesses across the United States and abroad. A partial list of clients includes EMC, IBM, Principal Financial, U.S. Army, U.S. Dept. of Homeland Security, U.S. Dept. of Veterans Affairs and many others. Information Security & Compliance ecfirst delivers deep expertise with its full suite of services that include Single Sign-On (SSO), context management, contingency planning/business Impact Analysis (BIA), vulnerability assessment, as well as managed compliance, security and IT infrastructure solutions. ecfirst has successfully executed fixed price, fixed deliverable, turnkey projects across the United States. All Rights Reserved ecfirst
5 World-class IT Professional Services The ecfirst Professional Staffing Practice excels in meeting your short and long term requirements for contract professionals in the areas of Web development, system, database and network administration, application development, system architecture, and project management. This practice is distinguished with credentialed staff (PMP, CBCP, CISSP, CSCS, CHSS or others that may be required) that includes deep industry knowledge in the healthcare, financial, technology and government markets. Compliance and Training Certification The ecfirst compliance training program is exclusively endorsed by the American Hospital Association (AHA). The Certified HIPAA Administrator (CHA TM ), Certified HIPAA Professional (CHP) and the Certified HIPAA Security Specialist (CHSS TM ) certifications are the gold standards in the Industry. The ecfirst Certified Security Compliance Specialist (CSCS) Program is the first and only information security program that addresses all major compliance regulations from a security perspective. Talk to ecfirst.com and you will find an organization that is passionate about the services we deliver and exceptionally devoted to its clients. For more information, please visit All Rights Reserved ecfirst
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @
Checklist for Breach Readiness Enabling a Resilient Organization Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Facts about breach violation impact
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES
EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance
Lead Nurse Planner: Roles and Functions
Lead Nurse Planner: Roles and Functions Introduction The Lead Nurse Planner is the licensed registered nurse accountable for the overall functioning of an Accredited Provider Unit, as noted in the 2013
HPC Healthcare, Inc. Administrative/Operational Policy and Procedure Manual
Operational and Procedure Manual 1 of 7 Subject: Corporate Compliance Plan Originating Department Quality & Compliance Effective Date 1/99 Administrative Approval Review/Revision Date(s) 6/00, 11/99, 2/02,
Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.
Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in
What Makes PMI Certifications Stand Apart?
What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI credentials unique? PMI certifications
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging
HEALTHCARE PAYER. Healthcare Payer. Overview
HEALTHCARE PAYER Healthcare Payer Overview Equipped for a rapidly changing market The face of healthcare is rapidly changing. Rising costs, reforms and a newly empowered consumer base are reshaping the
Business Continuity in Healthcare
Business Continuity in Healthcare Cynthia Simeone, CBCP, PMP Director Business Resilience Catholic Health Initiatives Scott Ream President Virtual Corporation 1 Session Speakers Cynthia Simeone, CBCP,
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations
Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
Opportunities in Private Healthcare in the GCC Presented by: Ralph Foster II
Opportunities in Private Healthcare in the GCC Presented by: Ralph Foster II AHMC PROFILE AHMC is a private US company headquartered in Washington D.C. focused on the development and management of world-class
State of Florida Department of Management Services
September 3, 2015 State of Florida Attn: Joel Atkinson Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 350 Seventh Avenue 10th Floor New York, New
What Makes PMI Certifications Stand Apart?
What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI certifications unique? PMI certifications
How To Plan A Crisis Management Program
Building a Security Conscious Business Continuity Management (BCM) Program Sam Stahl, CBCP, MBCI EMC Global Professional Services Program Manager [email protected] ASIS Singapore, 2014 Agenda Overview
Position Statement. Education and Certification for Nurse Life Care Planners. Status: Original Statement
Position Statement Education and Certification for Nurse Life Care Planners Status: Original Statement Authored by: American Association of Nurse Life Care Planners (AANLCP *) and the Certified Nurse Life
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
Appendix B: Existing Guidance to Support HIE Implementation Opportunities
Appendix B: Existing Guidance to Support HIE Implementation Opportunities APPENDIX B: EXISTING GUIDANCE TO SUPPORT HIE IMPLEMENTATION OPPORTUNITIES There is an important opportunity for the states and
FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS
FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE INTRODUCTION Any organization using Salesforce for customer relationship management
Get More Out of Your Risk Assessment. Austin Chapter of the IIA
Get More Out of Your Risk Assessment Austin Chapter of the IIA Speakers Alyssa G. Martin, CPA Dallas Executive Partner, Advisory Services 25 years of public accounting experience, with a practice emphasis
Future. Embracing. the. New Times, New Opportunities for Health Information Managers. Summary Findings. from the HIM.
The Future of Health Information Management Summary Findings from the HIM Workforce Study Embracing the Future New Times, New Opportunities for Health Information Managers The workforce research study
Secure Cloud Hosting for Healthcare Organizations
Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
(2) The neurological surgeon shall not participate in any activity, which is not in the best interest of the patient.
AANS Code of Ethics a) General Statement of Purpose The American Association of Neurological Surgeons has established a Code of Ethics for neurological surgeons as guidelines in medical, social, and professional
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Test Content Outline Effective Date: January 12, 2016. Nurse Executive Board Certification Examination
Board Certification Examination There are 175 questions on this examination. Of these, 150 are scored questions and 25 are pretest questions that are not scored. Pretest questions are used to determine
Meaningful Use of EHRs:
Meaningful Use of EHRs: First Steps To Improved Patient Outcomes www.ciscohealthpath.com Jointly sponsored by Postgraduate Institute for Medicine. Learn How to Achieve Meaningful Use In Your Practice With
AHE 232 Introduction to Clinical Software. Week six:
AHE 232 Introduction to Clinical Software Week six: Note: I have set up the entire curriculum for this class with weekly lesson plans. This will allow the Instructor to determine how to incorporate the
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
APRIL 2015 SECTION I - 1. Section I: Introduction and Overview
Section I: Introduction and Overview About Us... I-2 Resources... I-3 Sharp Health Plan s Responsibilities... I-4 Service Area... I-4 Compliance Program... I-4 Health Care Fraud, Waste, and Abuse Prevention...
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Course Title: Disaster Recovery, 1st Edition
Course Title: Disaster Recovery, 1st Edition Page 1 of 8 Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery
Business Continuity Plan Toolkit
Business Continuity Plan Toolkit March 2015 1 Contents The Template instructions for use... 2 Introduction... 3 What is the purpose of this toolkit?... 3 Why do you need a Business Continuity Plan?...
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
Job 1 of 1. Apply to job Send to friend Save to cart View similar jobs
Page 1 of 5 Job details Help Job 1 of 1 Apply to job Send to friend Save to cart View similar jobs Bulletin Number Type of Recruitment Position Title 16999BR Open Competitive Job Opportunity Mental Health
Texas Health Care Network
Why was the Health Care Network (HCN) created? Texas had the second highest workers compensation costs in the country. The cost to employers was making it difficult for employers to operate in Texas and
HIPAA and Network Security Curriculum
HIPAA and Network Security Curriculum This curriculum consists of an overview/syllabus and 11 lesson plans Week 1 Developed by NORTH SEATTLE COMMUNITY COLLEGE for the IT for Healthcare Short Certificate
APPLICATION FOR HEALTHCARE ORGANIZATION MEDICARE/MEDICAID BILLING ERRORS & OMISSIONS INSURANCE I. INSTRUCTIONS FOR COMPLETING THIS APPLICATION
APPLICATION FOR HEALTHCARE ORGANIZATION MEDICARE/MEDICAID BILLING ERRORS & OMISSIONS INSURANCE I. INSTRUCTIONS FOR COMPLETING THIS APPLICATION About This Application This Application is designed to give
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data 1 Table of Contents Executive Summary... 3 Template
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
Puerto Rican Family Institute, Inc.
Puerto Rican Family Institute, Inc. Stronghold for Families, a Pathfinder for Children Corporate Compliance Program Plan - 2014 Updated by: Approved by: Yolanda Alicea Winn, LCSWR Vice President/Corporate
SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE
SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE Subject: COMPLIANCE TRAINING Page 1 of 9 No. HIPAA-11 Original Issue Date 2/08 Prepared by: Shoshana Milstein Supersedes: 4/10 Reviewed by: Renee Poncet
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Medical Assistant Specialist Technology Enhanced Curriculum High Level Design Wadhwani Foundation & World Education, Inc.
Medical Assistant Specialist Technology Enhanced Curriculum High Level Design Wadhwani Foundation & World Education, Inc. 1. Introduction According to the U.S. Bureau of Labor Statistics, employment of
Course Overview. Certified Professional in Health and Hospital Administration (CPHHA)
Course Overview Certified Professional in Health and Hospital Administration (CPHHA) Contents: Learning Objectives: 2 Course Description: 2 Course Content: 3-4 Certification: 4 Course Schedule: 5-6 Certified
UNIVERSITY OF CALIFORNIA, SAN DIEGO HUMAN RESEARCH PROTECTIONS PROGRAM HUMAN SUBJECT PROTECTION TRAINING
UNIVERSITY OF CALIFORNIA, SAN DIEGO HUMAN RESEARCH PROTECTIONS PROGRAM A. General Information HUMAN SUBJECT PROTECTION TRAINING UCSD Institutional Review Board (IRB) human subject protection training has
Effectively Managing EHR Projects: Guidelines for Successful Implementation
Phoenix Health Systems Effectively Managing EHR Projects: Guidelines for Successful Implementation Introduction Effectively managing any EHR (Electronic Health Record) implementation can be challenging.
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
SUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
Business Continuity Planning for Schools, Departments & Support Units
Business Continuity Planning for Schools, Departments & Support Units 1 What is Business Continuity Planning? Examples Planning for an adverse, major or catastrophic event that would cause a disruption
Joe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
BUILDING A SECURITY CONSCIOUS BUSINESS CONTINUITY MANAGEMENT (BCM) PROGRAM
BUILDING A SECURITY CONSCIOUS BUSINESS CONTINUITY MANAGEMENT (BCM) PROGRAM SAM STAHL, CBCP, MBCI EMC GLOBAL PROFESSIONAL SERVICES PROGRAM MANAGER [email protected] ASIS SHANGHAI, 2015 1 AGENDA Overview
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
Information Technology Solutions at Work
Information Technology Solutions at Work Company Overview Established in 2000, E Quality Corporation is a privately held company headquartered in Dallas, Texas with regional offices in Springfield, Virginia.
