Aaron Weismann

Aaron Weismann is a healthcare industry CISO with over a decade of strategic management, technology, and information security experience. He deepest experience is in managing and securing sophisticated and highly regulated environments. His expertise includes: - Driving IT and data governance strategy - Managing complex security landscapes across sites, endpoints, and cloud structures. - Translating highly technical information security, technology, and governance concepts into communications for all organizational levels In The Press Recent citations of Aaron's writing include: BitDefender: Recent cybersecurity study reveals top US states to suffer data breaches MSSP Alert: Managed Security Services Provider (MSSP) Market News: 22 February 2023 R Street Institute: Considerations for Florida’s 2023 Privacy Journey Help Net Security: 10 US states that suffered the most devastating data breaches in 2022 Beckers Hospital Review: Georgia health system's operations disrupted by cyberattack

soc 2 readiness assessment

A SOC 2 readiness assessment, like other kinds of readiness assessments, highlights an organization’s ability to succeed in an assessment against a framework baseline. Readiness assessments are particularly helpful in driving cost savings for assessments, but take time and effort to conduct. In this article, I’ll outline what a SOC 2 readiness assessment is and […]

Is a SOC 2 Readiness Assessment Worth It? Comparing Costs & Benefits Read More »

soc 2 certification costs

SOC 2 certifications are a must for many businesses in 2023 and a nice-to-have for many others. It’s become a defacto measure of economic and cybersecurity health because of the quality and extent of the review, and the easy snapshot it provides into organizational, financial, and cybersecurity health. Unfortunately, working out your organization’s potential SOC

How Much SOC 2 Certification Costs Will Depend on 6 Factors Read More »

data study on identity theft

In which U.S. state is the average resident most likely to have their identity stolen? That’s the question we set out to answer in this data study. Some people think a higher population inevitably leads to higher cases of identity theft. More residents mean more identities to steal. As cybersecurity professionals, we had a different

The 10 Worst U.S. States For Identity Theft [Data Study] Read More »

worst data breaches by US state

Once again in 2022, the theft of Americans’ data through cyberattacks was consistent. And the moments when the highest number of citizens are at risk, are after corporate data breaches. These incidents that expose thousands – in some cases millions – of people’s personal data to criminals, cannot be studied in enough detail. Are data

The 10 Worst States in the U.S. for Data Breaches [Data Study] Read More »

The worst healthcare data breaches of all time.

There have been a slew of healthcare organizations that have experienced data breaches over the past decade. Some of those are mundane: misprinted and mismailed information or a phone call to the incorrect recipient. However, as healthcare organizations become increasingly sophisticated and use more technology more often to support operations, errors or attacks against that

The 10 Worst Healthcare Data Breaches of All Time (U.S) Read More »

HIPAA Risk Assessment

A HIPAA Risk Assessment, or a HIPAA Security Risk Assessment more precisely, is a mandatory requirement for Covered Entities and Business Associates in their HIPAA Security Rule compliance journey. HIPAA Security Risk Assessments can be straightforward, but it’s critical to understand what to review, how, and against what frameworks. Let’s dive into what a HIPAA

8 Steps to a Proper HIPAA Risk Assessment Read More »

HITRUST just released its 11th version of HITRUST cybersecurity framework or HITRUST CSF. One of the major changes in version 11 is the removal of the HITRUST bC assessment and its replacement with the new HITRUST e1. Let’s dive into some high-level information about what the HITRUST e1 assessment is, why an organization would pursue

Understanding the New HITRUST e1 Essentials Certification Read More »

ePHI for healthcare

When the Health Insurance Portability and Accountability Act of 1996 was first drafted, the internet and electronic data were seen by many as a passing fad. In the 27 years since then, not only has the internet become a major force in most peoples’ lives, electronic Protected Health Information, or ePHI, is the primary modality

ePHI for Healthcare: Everything You Need to Know Read More »

HITRUST certification

The HITRUST Common Security Framework (CSF) was created by the Health Information Trust Alliance (or HITRUST Alliance) to provide a formal certification process for an information security program. HITRUST certification provides a high degree of confidence in the verified ability of an organization to meet its regulatory compliance needs and ability to implement reasonable safeguards.

HITRUST Certification: 15 Important Questions Answered Read More »

hitrust vs soc 2

If you’ve reached this page you’re likely wondering: how do I provide independent verification and validation of my organization’s security controls? Both HITRUST certification and a SOC 2 assessment are great ways to accomplish that need. Both accomplish that in completely different ways: In this article, I’ll provide some opinions about why you’d choose one

HITRUST vs SOC 2: Costs vs Benefits Compared Read More »

Network Assured on Facebook     Network Assured on Twitter
Copyright © 2022 Network Assured