Security

If you can't find what you want, Ask Us.

Refine Your Results

reset

Filter by Category

Location

Dates

FEATURED VENDORS

Showing 1-20 of 113 results Sort by:

Courses

  • 1 Request Info

    ACTIVE SHOOTER

    This course helps you prepare to respond to an active shooter situation. It begins by describing the typical character of active shooter incidents. It then explains how to determine the correct course of action in such a situation depending on the circumstances: escape, hiding in a secure location, or physically engaging with the shooter. The course then lays out the principles you should follow in relation to each of these options. Finally, you’ll also learn about what to expect and how to react when law enforcement arrives. This course was developed with subject matter support provided by Tactical Advantage Corp., a leader in personal protection training and personal safety.
  • 2 Request Info

    Applied Statistics for FDA Process Validation 2017

    In Guidance for Industry Process Validation: General Principle and Practices, process validation is defined as, ""...the collection and evaluation of data, from the process design stage through commercial production.." The guidance further delineates the 'process design stage through commercial production' into three distinct stages of the product lifecycle: Stage 1: Process Design: The commercial manufacturing process is defined during this stage based on knowledge gained through development and scale-up activities. Stage 2: Process Qualification: During this stage, the process design is evaluated to determine if the process is capable of reproducible commercial manufacturing. Read More : http://www.globalcompliancepanel.com/control/globalseminars/~product_id=901142SEMINAR?trainingregistry-September-2017-SEO
  • 3 Request Info

    Applied Statistics for Scientists and Engineers 2017

    Throughout 21 CFR and guidance documents for the pharmaceutical, biopharmaceutical, and medical device industries, the application of statistical methods are specified for: setting validation criteria and specifications, performing measurement systems analysis (MSA), conducting stability analysis, using design of experiment (DOE) for process development and validation, developing process control charts, and determining process capability indices. Different statistical methods are required for each of these particular applications. Data and tolerance intervals are common tools used for setting acceptance criteria and specifications. Read More: http://www.globalcompliancepanel.com/control/globalseminars/~product_id=901138SEMINAR?trainingregistry-December-2017-SEO
  • 4 Request Info

    Cyber Attacks, Beyond Disaster Recovery - 2017

    Overview: Cyber-attacks and breaches dominate the media and are a significant focus of the government. Businesses and financial institutions are faced with the grim reality that a cyber-attack is inevitable. It's not a matter of if an attack will occur, only when. Why should you Attend: A poor response is often more damaging that the cyber-attack itself. According to recent reports, cyber-attacks cost the average American business $15.4 million per year, double the global average of $7.7 million.
  • 5 Request Info

    Developing Workplace Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 6 Request Info

    Fremont 2016 Webinar on How to do a Cyber Security Risk Assessment

    Overview: The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation. Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan.
  • 7 Request Info

    HIPAA Privacy Security - Time to GetSerious

    I have conducted over 400 risk assessments for business associates and covered entities alike as well as worked directly with the Federal government in terms of auditing. This seminar will go into great detail about what is going on in the HIPAA Security/ Privacy world. I will discuss why the government is all of a sudden going full bore in demanding compliance. You will learn risk factors to avoid, best practices you should be doing, and how to be proactive in your efforts. In addition we are going to be discussing the methods in which patients can now sue under HIPAA and the steps they may be taking for civil remedy. On top of that what your practice or business needs to do so you can avoid the situation all together.
  • 8 Request Info

    Martial Arts & Self Defense Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 9 Request Info

    NFPA 1600 BUSINESS CONTINUITY PROGRAMS

    Whether it is a natural disaster that sweeps through your city or a computer virus that destroys vital electronic information, businesses need to be able to recover their services and operations as soon as possible if such a disaster does occur. A Business Continuity Program involves planning the recovery of operations when confronted with adverse events such as natural disasters, technological failures, human error, and terrorism. This course provides a basic understanding of the criteria for a comprehensive program that addresses business continuity in accordance with the National Fire Protection Association (NFPA) standard 1600, entitled Disaster/Emergency Management and Business Continuity Programs.
  • 10 Request Info

    NFPA 1600 DISASTER/EMERGENCY MANAGEMENT

    Over the past decade, emergency management and business continuity planning have been recognized as necessary to continued operational success in both the public and private sectors. Key to this was the development and widespread use of the National Fire Protection Association (NFPA) Standard on Disaster/Emergency Management and Business Continuity Programs (NFPA 1600). The NFPA 1600 standard is a description of the basic criteria for a comprehensive program that addresses disaster recovery, emergency management, and business continuity. NFPA 1600 is considered by many to be an excellent benchmark for continuity and emergency planners in both the public and private sectors. The standard addresses methodologies for defining and identifying risks and vulnerabilities and provides planning guidelines that address stabilizing the restoration of the physical infrastructure, protecting the health and safety of personnel, and crisis communications procedures. This course will provide you with
  • 11 Request Info

    NIST Cybersecurity Framework For Computer Systems Validation

    Overview: Computer systems used in highly regulated companies include sensitive and valuable information. Some of this information includes valuable electronic submissions, clinical information, medical device design control records, legal information, and other such information. Recent events have highlighted sophisticated cybersecurity attacks everywhere including the White House.Corporations have been attacked at an alarming rate. What does this mean for computer systems validation?
  • 12 Request Info

    Preventing Personal ID Theft & Security ......

    MVP Seminars LLC, is a leading nationwide provider of business training seminars, consulting professionals & exceptional coaches, with quality academic backgrounds. Largest family operated seminar company in USA. Please call 510-558-3495.
  • 13 Request Info

    Regulatory Filing Requirements and Compliance Processes for Medical Devices 2017

    Japan's classification system differs from that of the United States or European Union Medical devices are classified to Class I, II, III, or IV depending on their risk level Medical devices must also comply with Japanese Industrial Standards and these standards define industry-wide safety and performance requirements Strict new package insert requirements Change to MAH Licensing rules A new MAH License category for In Vitro Diagnostic (IVD) devices A new registration system for manufacturers A new QMS conformity assessment system
  • 14 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    Cyber Security Incident Response Program is a must for any organization using the Internet. It must be robust yet flexible. Unfortunately in spite of all of the Cyber Events, many companies are taking a long time to respond. Teams must be trained and have written procedures. Time is critical in responding to an incident. Every incident costs the organization, money and reputation.
  • 15 Request Info

    San Francisco Conference on Cyber Security Incident Response Program (CSIRT) and Plans

    In this session you will learn: • Best practices and the standards that make up a great Cyber Incident Response Program • Learn what teams should be part of your CSIRT Team • Get insight into how to create CSIRT Playbooks and Management Plans • Learn how to conduct inexpensive tests of the CSIRT Teams and Programs • This program will help you determine your current Gaps and provide milestones for correcting the Gaps
  • 16 Request Info

    Spreadsheets for 21 CFR 11 Compliance 2018

    Spreadsheet Applications such as MS Excel are frequently used in 21 CFR 11 compliant environments, but they were not specifically designed for regulated environments and their development is not optimized for 21 CFR 11 compliance. However, the FDA expects that spreadsheets be compliant and lack of compliance can result in a warning letter. Consequently, validation of Excel Spreadsheet Applications is required as part of a 21 CFR 11 compliant environment.
  • 17 Request Info

    Test Course

    Test Course
  • 18 Request Info

    This course will provide an awareness-level orientation of basic workplace security fundamentals and appropriate actions for workers to take in the ev

    This course will help business travelers reduce the risks to their person and property while traveling for work. It provides guidelines on how to take precautionary and evasive measures to avoid becoming a victim of crime in various environments frequented by travelers, including airports, hotels, and driving in a car, and when out and about in a new location. It also provides advice on what a business traveler should do in the aftermath of a crime. This course was developed with subject matter provided by Eric L. Matson of Norsemen Training & Consulting Group, a global professional services company focusing on corporate, business and personal safety training.
  • 19 Request Info

    Webinar On 2016 Financial Regulator Priorities - SEC, FINRA, and State Regulators

    In this training program, attendees will learn how to gain access to the financial regulators priorities and understand how to apply those priorities to their firm. The program will also discuss incorporating the priorities into your annual review and identifying priorities that need to become part of the compliance manual/code of ethics.Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 info@onlinecompliancepanel.com Event link http://www.onlinecompliancepanel.com/webinar/2016-FINANCIAL-PRIORITIES-501714/SEPTEMBER-2016-ES-TRAININGREGISTRY
  • 20 Request Info

    Webinar On 2016 Planning for UCC Article 4A: Electronic Banking Fraud Risk Management and Contractual Mitigation

    This webinar will help you keep abreast of developing legal trends and supervisory priorities in order to position your bank or credit union to best master electronic commercial payment orders, ACH and wire issues under UCC 4A.Price:$200.00. Contact info : OnlineCompliancePanel Phn. no. +1-510-857-5896 Fax-+1-510-509-9659 info@onlinecompliancepanel.com Event link http://onlinecompliancepanel.com/webinar/2016-PLANNING-UCC-ARTICLE-4A-501721/SEPTEMBER-2016-ES-TRAININGREGISTRY