Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • What are the most important use cases for Blockchain in the Pharmaceutical Industry?

    What are the most important use cases for Blockchain in the Pharmaceutical Industry?

    (Article originally published in Rx Data News, Issue 5 Vol. 1)

    Read Article
  • Direct Liability of Business Associates Under HIPAA

    Direct Liability of Business Associates Under HIPAA

    Read Flipbook
  • Newly Issued Fact Sheet on Direct Liability of Business Associates under HIPAA

    Newly Issued Fact Sheet on Direct Liability of Business Associates under HIPAA

    On May 24th, The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a fact sheet on direct liability of Business Associates under HIPAA. For reference,...

    Read Article
  • ×



    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success
    Error - something went wrong!
  • 2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    I didn’t hesitate to accept when Schellman & Company asked if I would represent our team at the Executive Women’s Forum (EWF) Third Annual Cybersecurity Women on Capitol Hill...

    Read Article
  • The Bright Side of Technology: Tech Hacks That Have Improved Society During This Fourth Industrial Revolution

    The Bright Side of Technology: Tech Hacks That Have Improved Society During This Fourth Industrial Revolution

    Even when the developments might’ve been considered fairly primitive by modern standards, technological progress has always been a definitive characteristic of humanity.  Like any new...

    Read Article
  • EU Cybersecurity Act: What you need to know

    EU Cybersecurity Act: What you need to know

    What is it? The EU Cybersecurity Act is the fruit of an initiative started by the European Parliament in 2017 with the goals of permanently establishing an agency to address...

    Read Article
  • How to Build a Serverless Architecture

    How to Build a Serverless Architecture

    A serverless architecture can mean lower costs and greater agility, but you’ll still need to make a business case and consider factors like security and storage before migrating...

    Read Article
  • Key Observations since GDPR Enforcement

    Key Observations since GDPR Enforcement

    Giant strides have been made in privacy rights and regulations in Europe and many parts of the globe ever since the General Data Protection Regulation (GDPR) became enforceable on May...

    Read Article
  • Looking Back at GDPR and Looking Forward52:14

    Looking Back at GDPR and Looking Forward

    Watch Video
  • Webinar - FedRAMP Best Practices and Federal Compliance Updates49:51

    Webinar - FedRAMP Best Practices and Federal Compliance Updates

    Join Schellman's Federal Practice Team as they take a step back to navigate through the more recent updates with FedRAMP and more broadly Federal Assessments.

    Watch Video
  • Data Privacy is in the Spotlight as Colorado Enacts Landmark Consumer Data Privacy Bill (PCDP)

    Data Privacy is in the Spotlight as Colorado Enacts Landmark Consumer Data Privacy Bill (PCDP)

    Introduction— by Lindsey Ullian, Threat Stack Compliance ManagerColorado has rightfully gained a reputation as one of the most socially progressive states as it was one of the first to...

    Read Article
  • Is It Time for Your Organization to Form an AI Ethics Committee?

    Is It Time for Your Organization to Form an AI Ethics Committee?

    Do you need to set up an artificial intelligence ethics committee if you are using this technology? Google certainly thought it did — until it changed its mind. Of course Google is one...

    Read Article
  • Microsoft SSPA Program Attestation

    Microsoft SSPA Program Attestation

    What the SSPA requirement means for your business.

    Read Flipbook
  • How to Plan for the Worst Possible Disaster Recovery Scenarios

    How to Plan for the Worst Possible Disaster Recovery Scenarios

    Your worst-case DR scenario today might be vastly different than it was just a few years ago. What's the worst that could happen to your data center in the event of a disaster?

    Read Article
  • 7 Questions: Why Avani Desai loves the 'moon' button on her iPhone

    7 Questions: Why Avani Desai loves the 'moon' button on her iPhone

    As president of Tampa accounting firm Schellman & Company, Bizwomen Headliner Avani Desai deals with topics like emerging healthcare issues and privacy concerns for organizations, so...

    Read Article
  • NYDFS: Two Years Later, Let’s Check-In

    NYDFS: Two Years Later, Let’s Check-In

    Last month marked two years since the New York Department of Financial Services (NYDFS) cybersecurity requirements went into effect, so what exactly has been happening during that...

    Read Article
  • Productivity, Unexpected Outcomes and Opportunity When Using AI in Audits

    Productivity, Unexpected Outcomes and Opportunity When Using AI in Audits

    This article was originally published in the ISACA Journal, Volume 2 and can be accessed online by members via the ISACA website.

    Read Article
  • Passwords: A Game of Pwns - A Hash of Kings

    Passwords: A Game of Pwns - A Hash of Kings

    Apparently, someone put World Password Day (May 2) just before Star Wars Day (May 4) and while the most hotly anticipated final season on TV is airing (“Game of Thrones”). This seems...

    Read Article
  • Simple Tips for Your Best Interview

    Simple Tips for Your Best Interview

    Does anyone really enjoy being interviewed? Usually, it’s not at the top of the list of favorite things to do. While it’s something that needs to be done if you’re interested in making...

    Read Article
  • How Serious is Mark Zuckerberg About Keeping Facebook Data Private?

    How Serious is Mark Zuckerberg About Keeping Facebook Data Private?

    On March 6, Mark Zuckerberg made a commitment to spending the next several years reorienting Facebook’s apps toward encryption and privacy. Can we take him at his word? Find out what...

    Read Article
  • loading
    Loading More...