
{"id":2475,"date":"2013-06-05T00:00:00","date_gmt":"2013-06-05T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encryption-webinar-series-launches-june-2013\/"},"modified":"2013-06-05T00:00:00","modified_gmt":"2013-06-05T00:00:00","slug":"encryption-webinar-series-launches-june-2013","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/","title":{"rendered":"Encryption Webinar Series Launches June 2013"},"content":{"rendered":"<p id=\"docs-internal-guid-7be56b93-1503-e982-d9d5-e0890f921e26\" dir=\"ltr\">We\u2019re launching an encryption webinar series for three consecutive weeks this June! Get informed from several different perspectives on the data security service, from that of a Certified HIPAA Professional (CHP) to a Software Development Manager and Systems Support Manager.<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Encryption &#8211; Perspective on Privacy, Security &amp; Compliance<\/a><\/strong><br \/>\n<em>Tuesday, June 11, 2013 @ 2PM ET<\/em><br \/>\nStarting with a perspective on privacy, security and compliance (including encrypting data for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> and <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a>), we\u2019ll dive into the legalities of encryption, typical encryption methodologies and how to document and present for auditing purposes.<\/p>\n<p dir=\"ltr\">Join Chris Heuman, Practice Leader for RISC Management and Consulting, for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Learn more and sign up online here.<\/a><\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Encryption at the Software Level: Linux and Windows<\/a><\/strong><br \/>\n<em>Tuesday, June 18, 2013 @ 2PM ET<\/em><br \/>\nNext, we delve into a more technical discussion about encryption at the software level for both Linux and Windows, and how encryption can be applied at various levels, from the software application code, as well as the impact on performance, backup, security and more.<\/p>\n<p dir=\"ltr\">Join Farooq Ahmed, Software Development Manager for Online Tech and Mark Stanislav, Security Evangelist for Duo Security as they explore how to employ encryption in order to mitigate risk of data loss or breach and what to consider in comparing different methods. <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Learn more and sign up online here.<\/a><\/p>\n<p><strong><a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">Encryption at the Hardware and Storage Level<\/a><\/strong><br \/>\n<em>Tuesday, June 25, 2013 @ 2PM ET<\/em><br \/>\nJoin Steve Aiello, Systems Support Manager at Online Tech for an informative webinar on encryption at the hardware and storage level. \u00a0Steve will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations.<\/p>\n<p dir=\"ltr\">This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. <a href=\"https:\/\/www.onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">Learn more and sign up online here.<\/a><\/p>\n<p dir=\"ltr\">Encryption is just one tool considered a best practice for organizations concerned with security or those that need to meet specific compliance regulations. Find out other best practices and requirements in our white papers:<\/p>\n<p><strong><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting<\/a><\/strong><br \/>\nThis white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a HIPAA compliant data center IT architecture, contractual requirements, benefits and risks of data center outsourcing, and vendor selection criteria.<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/unencrypted-data-big-problem-for-banks-merchants\/resources\/white-papers\/pci-compliant-data-centers\">PCI Compliant Hosting<\/a><\/strong><br \/>\nThis white paper provides information on PCI hosting requirements, recommendations, and the foundation of a secure PCI compliant data center.<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security<\/a><\/strong><br \/>\nThis white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment.<\/p>\n<p>Read more about encryption in:<\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security &amp; EHR Safety<\/a><\/em><\/strong><br \/>\nThe proposed federal fiscal 2014 budget calls for a 28 percent increase to support further development of health IT initiatives while taking over where HITECH funding stops (ending in fiscal year 2013). The Office for Civil Rights\u2019 (ONC) funding will \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">2013 State of HIPAA Encryption &amp; Authentication for Healthcare<\/a><\/strong><\/em><br \/>\nAccording to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Encrypting Data to Meet HIPAA Compliance<\/a><\/strong><\/em><br \/>\nTo address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let\u2019s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re launching an encryption webinar series for three consecutive weeks this June! Get informed from several different perspectives on the data security service, from that of a Certified HIPAA Professional (CHP) to a Software Development Manager and Systems Support Manager. Encryption &#8211; Perspective on Privacy, Security &amp; Compliance Tuesday, June 11, 2013 @ 2PM ET Starting with a perspective on privacy, security and compliance (including encrypting data for HIPAA and PCI), we\u2019ll dive into the legalities of encryption, typical encryption methodologies and how to document and present for auditing purposes. Join Chris Heuman, Practice Leader for RISC Management and Consulting, for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Learn more and sign up online here. Encryption at the Software Level: Linux and Windows Tuesday, June 18, 2013 @ 2PM ET Next, we delve into a more technical discussion about encryption at the software level for both Linux and Windows, and how encryption can be applied at various levels, from the software application code, as well as the impact on performance, backup, security and more. Join Farooq Ahmed, Software Development&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2475","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encryption Webinar Series Launches June 2013 | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Webinar Series Launches June 2013\" \/>\n<meta property=\"og:description\" content=\"We\u2019re launching an encryption webinar series for three consecutive weeks this June! Get informed from several different perspectives on the data security service, from that of a Certified HIPAA Professional (CHP) to a Software Development Manager and Systems Support Manager. Encryption &#8211; Perspective on Privacy, Security &amp; Compliance Tuesday, June 11, 2013 @ 2PM ET Starting with a perspective on privacy, security and compliance (including encrypting data for HIPAA and PCI), we\u2019ll dive into the legalities of encryption, typical encryption methodologies and how to document and present for auditing purposes. Join Chris Heuman, Practice Leader for RISC Management and Consulting, for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Learn more and sign up online here. Encryption at the Software Level: Linux and Windows Tuesday, June 18, 2013 @ 2PM ET Next, we delve into a more technical discussion about encryption at the software level for both Linux and Windows, and how encryption can be applied at various levels, from the software application code, as well as the impact on performance, backup, security and more. Join Farooq Ahmed, Software Development...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-05T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encryption Webinar Series Launches June 2013\",\"datePublished\":\"2013-06-05T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\"},\"wordCount\":645,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\",\"name\":\"Encryption Webinar Series Launches June 2013 | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-06-05T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Webinar Series Launches June 2013\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption Webinar Series Launches June 2013 | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Webinar Series Launches June 2013","og_description":"We\u2019re launching an encryption webinar series for three consecutive weeks this June! Get informed from several different perspectives on the data security service, from that of a Certified HIPAA Professional (CHP) to a Software Development Manager and Systems Support Manager. Encryption &#8211; Perspective on Privacy, Security &amp; Compliance Tuesday, June 11, 2013 @ 2PM ET Starting with a perspective on privacy, security and compliance (including encrypting data for HIPAA and PCI), we\u2019ll dive into the legalities of encryption, typical encryption methodologies and how to document and present for auditing purposes. Join Chris Heuman, Practice Leader for RISC Management and Consulting, for an informative webinar on the value of encryption for HIPAA, PCI and many other regulatory frameworks and the successful components of a data security program that integrates encryption. Learn more and sign up online here. Encryption at the Software Level: Linux and Windows Tuesday, June 18, 2013 @ 2PM ET Next, we delve into a more technical discussion about encryption at the software level for both Linux and Windows, and how encryption can be applied at various levels, from the software application code, as well as the impact on performance, backup, security and more. Join Farooq Ahmed, Software Development...","og_url":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/","og_site_name":"OTAVA","article_published_time":"2013-06-05T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encryption Webinar Series Launches June 2013","datePublished":"2013-06-05T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/"},"wordCount":645,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/","url":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/","name":"Encryption Webinar Series Launches June 2013 | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-06-05T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encryption-webinar-series-launches-june-2013\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encryption Webinar Series Launches June 2013"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2475"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2475\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2475"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}