What is HIPAA Compliance and Why is it a Must for Your Company?
In this article, we’re focusing on HIPAA compliance and how your organization can stay ahead of the compliance curve.
Head of GRC
Kyle Morris is a highly experienced Governance, Risk, and Compliance (GRC) professional with over 12 years of expertise in information security, IT auditing, and regulatory compliance. As the Head of GRC, he is a Certified Information Systems Auditor (CISA) and an ISO 27001 Certified Lead Implementer, with a Bachelor of Science degree in Computer Science.
Kyle began his career as a Senior Analyst at a Big Four IT audit firm, gaining valuable experience across various industries like banking, mining, manufacturing, and healthcare. He is recognized for his deep knowledge and hands-on experience in leading organizations through key security and privacy frameworks including SOC 1, SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS, NIST, NIS2, CSA STAR, CMMC, and DORA. Kyle is a trusted expert known for simplifying complex risks. He helps businesses around the world build effective, scalable compliance programs and foster strong, risk-aware cultures.
In this article, we’re focusing on HIPAA compliance and how your organization can stay ahead of the compliance curve.
Discover the key differences between SOC 2 and SAS 70, and learn why SOC 2 is the modern standard for ensuring data security and compliance.
HITRUST vs. ISO 27001: Compare the two frameworks and choose the best fit for your organization’s security needs.
Learn why AI policy is vital for ethical development and how regulations like the EU AI Act shape the future.
Learn about the NIS2 Directive’s impact on your organization and key steps for compliance with new cybersecurity standards.
Discover how the NIS2 Directive enhances EU cybersecurity and protects digital assets. Learn why compliance is crucial for your business.
This blog delves into CMMC, the introduction of CMMC 2.0, what’s changed, and what it means for your business.
How do you keep tabs on your vendors without draining resources? Here’s our list of best practices for vendor risk management.
Take a look at the intricacies of a ISO 27001 report and where it falls within the internal audit process.
This quick guide breaks down the steps of achieving CMMC so your business can protect sensitive government data.
Here are the top 5 mistakes organizations make during ISO 27001 implementation and how to steer clear of them.
Key Considerations for NIST 800-53 Control Families, How They Work, and How to Get Started With Implementing Them.