Cybersecurity and Computer Systems Validation - 2017

  • Free
  • Published date: August 14, 2017
    • Fremont, California, United States

Overview:
Computer systems used in highly regulated companies include sensitive and valuable information. Some of this information includes valuable electronic submissions, clinical information, medical device design control records, legal information, and other such information.

Why you should attend:
Today's headlines are filled with instances of cyber attacks resulting in denial of service, data theft or compromise and even ransomware holding critical data hostage while demanding payment.

Areas Covered In the Session:
The Cyber Threat Megatrends: What You Need To Know For Validated Systems
Understanding Cybersecurity Regulatory Guidance and Standards
Cybersecurity Qualification:The NEXT Frontier
Automated Testing in the Cloud
Top 20 Critical Security Controls For Validated Systems
Cloud Security Technology Maturity
Cloud Quality Assurance & Governance

Who will benefit:
IT Managers, Directors, VPs, Chief Information Officers
Quality Assurance/Quality Control Managers
Validation Engineers
Validation Project Managers
Program/Project Managers

Speaker Profile:
Valarie King-Bailey is the CEO of OnShore Technology Group, an independent Chicago-based consultancy founded in 2004 specializing in Independent Validation and Verification (IV&V) services and solutions. OnShore’s flagship product, ValidationMaster™ is the first Lean Enterprise Validation Management & Quality System (EVMQ) on the market.

Contact Detail:
Compliance4All DBA NetZealous,
Phone: +1-800-447-9407
Email: support@compliance4All.com

Result 0 votes
Compliance4All
0 votes

Useful information

  • Avoid scams by acting locally or paying with PayPal
  • Never pay with Western Union, Moneygram or other anonymous payment services
  • Don't buy or sell outside of your country. Don't accept cashier cheques from outside your country
  • This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"

Related listings

  • How software requirements are used in validation

    How software requirements are used in validation

    Computers - Software Fremont (California) November 27, 2017 Free

    Overview: This course is NOT a programming course. We will discuss what must be done but will not discuss methods to execute necessary testing. Why should you Attend: Testing software to prove that it works and has no bugs is not sufficient to obtain...

  • Excel - Benefits and Hazards in Office 365

    Excel - Benefits and Hazards in Office 365

    Computers - Software Fremont (California) November 27, 2017 Free

    Overview: In this valuable presentation, Excel expert David Ringstrom, CPA, explains how the Office 365 version of Excel 2016 differs from previous versions and perpetual licensed versions of Excel 2016. Historically, each major version of Excel was ...