All Episodes
Compliance Pointers — 99 episodes
SOC 2 Auditor Red Flags
Analyzing the Written Consent Ruling
The Intersection of AI Governance and Traditional Security Frameworks
State Privacy Laws - What Regulators are Looking For
Cloud Security and Compliance Best Practices
The California Invasion of Privacy Act - Managing CIPA Risks
AI Risk Management That Scales with Adoption
The HITRUST AI Options
Ask an Attorney: What's Driving Email Compliance Litigation
Is ISO 42001 Right for Your Business?
CMMC Scoping and Self Assessments
Ask an Attorney: Analyzing Texas SB 140 Risks
CCPA Cybersecurity Audits
Where do Consent Revocation Rules Stand?
B2B Marketing and the TCPA
AI and SOC 2 Compliance
What is the EU AI Act?
How to Complete InfoSec Audits Faster
Managing Telemarketing Partner Risks
S3 E37: Getting to Know NIST AI RMF
S3 E36 How State Privacy Laws Impact Telemarketing
S3 E35: HIPAA Risk Assessments
S3 E34: A HITRUST Certification Story
S3 E33: How ISO 42001 Fits Into the Current AI Landscape
S3 E32: Telemarketing in Texas Just Got Riskier
S3 E31: The Impact of the SCOTUS McLaughlin Ruling
S3 E30: ISO as a Catalyst, Not a Checkbox
S3 E29: Integrating GRC Tools Into Your Compliance Program
S3 E28: Common Penetration Testing Mistakes
S3 E27: How to Read a SOC 2 Report
S3 E26: How Existing AI Laws Impact Businesses
S3 E25: What's Driving TCPA Lawsuits
S3 E24: HITRUST Certification First Steps
S3 E23 Solving Website Cookie Configuration and Compliance Challenges
S3 E22: The Path to SOC 2 Compliance
S3 E21: Don't Forget Email in Your Marketing Compliance Program
S3 E20: The Lessons Learned from CCPA Enforcements
S3 E19: How Your ISO 27001 Certification can Accelerate ISO 42001 Compliance
S3 E18: Are Recent Rulings Changing the Telemarketing Regulatory Landscape
S3 E17: Aligning Cybersecurity Controls to Healthcare Compliance Obligations
S3 E16: Changes at HHS and the Impact on HIPAA
S3 E15: Medical Device Cybersecurity
S3 E14: Leveraging AI in PCI Assessments
S3 E13: Cybersecurity in an Era of Deregulation
S3 E12: Building a Security and Privacy Culture
S3 E11: Telemarketing Litigation Trends
S3 E10: A Compliance Journey with Tamara Lauterbach
S3 E9: The Top Privacy Priorities of 2025
S3 E8: Selecting the Right ISO Readiness Partner
S3 E7: CompliancePoint Exchange
S3 E6: Using AI in Security and Compliance Assessments
S3 E5: Protecting Your Business From Professional Plaintiffs
S3 E4: Building a Third-party Risk Management Program
S3 E3: Telemarketing Regulations: What to Expect in 2025
S3 E2: Proposed HIPAA Security Rule Updates
S3 E1: PCI and SOC 2 Combined Audits
S2 E37: Privacy Regulations: 2024 Review and 2025 Preview
S2 E36: The Impact of One-to-one Consent on Outbound Calling
S2 E35: CMMC is Finalized, What Comes Next?
S2 E34: Getting Ahead of PCI DSS 4.0 Future-dated Requirements
S2 E33: Deciding Between SOC 2 and HITRUST
S2 E32: AI and Compliance with Privacy Regulations and the TCPA
S2 E31: Why ISO Makes Sense Even Without a Customer Requirement
S2 E30: Common HIPAA Privacy Rule Mistakes
S2 E29: Website Privacy Functions and Controls
S2 E28: The Value of Compliance Orchestration
S2 E27: Consent Revocation Rules and Best Practices
S2 E26: Risk and Data Stewardship Throughout the Business Life Cycle
S2 E25: Data Stewardship for Venture Capital and Private Equity Firms
S2 E24: Geopolitical Ransomware - The Growing Threat and Defense Strategies
S2 E23: Compliance Pointers is Taking a Short Summer Break
S2 E22: Where are all the ISO 42001 Certificates Part 2
S2 E21: Where are all the ISO 42001 Certificates Part 1
S2 E20: ISO 27001: 2022 Common Challenges and Solutions
S2 E19: State-level TCPAs: The Requirements and Risks
S2 E18: Change Healthcare - The Impact and the Lessons Learned
S2 E17: Where you Should be in the Transition to PCI DSS v4.0
S2 E16: Building an Effective Cybersecurity Training Program
S2 E15: Breaking Down the American Privacy Rights Act
S2 E14: Telemarketing Regulations Update Spring 2024
S2 E13: The Essentials of Penetration Testing Part 2
S2 E12: The Essentials of Penetration Testing Part 1
S2 E11: Reducing the Risk of Internal Threats in Healthcare
S2 E10: Why You Need to do Calling Data Audits
S2 E9: The Impact of AI on Privacy Regulations and Compliance
S2 E8: Getting to Know PCI 3DS
S2 E7: Achieving Compliance with NIST 800-171 Part 2
S2 E6: Achieving NIST 800-171 Compliance Part 1
S2 E5: The Value of Risk Assessments in Healthcare
S2 E4: Understanding Your Privacy Notice Obligations
S2 E3: The Impact of the FCC's New Lead Generation Rules
S2 E2: The Major Changes in PCI DSS v.40
S2 E1: Preparing for a SOC 2 Audit
S1 E6: Making Data Privacy Impact Assessments Easier
S1 E5: Effective Vendor Security Evaluations
S1 E4: CMMC: The Requirements, Challenges, and Benefits
S1 E3: Transitioning to PCI DSS v4.0
S1 E2: Effective Record Keeping for Do Not Call Compliance
S1 E1: Web Trackers and HIPAA Compliance