M365B Logo   CSE Logo CC Logo
Click Here
HURRY! ONLY A FEW SEATS AVAILABLE
IT Privacy and Security Compliance

Security teams are constantly challenged to protect their company information and comply with a growing list of state and federal laws and regulations that require more expansive and complex information security measures to avoid data breaches. And many organizations in the US outside of healthcare are just now becoming acquainted with formal privacy management to address things that security programs aren’t equipped handle, such as data minimization and data subject rights.

As your trusted IT advisor, we are committed to both build and maintain a partnership with you to meet your privacy and security compliance needs. As you move your data to a Microsoft cloud service, such as Office 365, Azure, or Dynamics 365, we partner with you to help you achieve compliance using Microsoft’s shared responsibility model.

Computer Solutions East and Cover Compliance have teamed up to bring you a 30-minute webinar:

“IT Privacy and Security Compliance Simplified for your Business”.
About the Speaker
Glenn Mills got his start in privacy & compliance in 2003 just as “big data”, CAN-SPAM, state data breach laws, and financial privacy & security concerns solidified the need for privacy experts to minimize business & personal risks related to personal information.

Glenn created Cover Compliance in 2008 to focus on smaller enterprises that face the same compliance challenges as large organizations but usually lack the resources that larger businesses take for granted.

In 2016, Glenn was recognized for his contribution to the privacy profession by being one of the first 200 privacy professionals out of more than 25,000 IAPP members worldwide to earn the designation of "Fellow of Information Privacy (FIP)".
Select a prefered date and click on the registration link to register
Webinar Topic Webinar Date Registration Link
GDPR Compliance using Microsoft 365 Business 1:00 pm EDT | 06/05/2018, Tuesday Completed
1:00 pm EDT | 06/07/2018, Thursday Completed
1:00 pm EDT | 06/12/2018, Tuesday Completed
1:00 pm EDT | 06/14/2018, Thursday Completed
1:00 pm EDT | 06/19/2018, Tuesday Completed
1:00 pm EDT | 06/21/2018, Thursday Completed
1:00 pm EDT | 06/26/2018, Tuesday Completed
1:00 pm EDT | 06/28/2018, Thursday Click Here
Why should you attend? Because:
  • You are an IT decision maker from a small or medium-sized business that wants to strengthen the protection of your data,
  • You have been wanting to implement information protection best practices, but don’t know where to start,
  • You have already started your own privacy and/or security compliance program and you are looking for direction,
  • You already have an active privacy and security compliance program and you want to learn how to assess your own program’s compliance strengths and weaknesses, or
  • You want to prepare your business to minimize the impact of potential data breaches.