
{"id":2481,"date":"2013-06-10T00:00:00","date_gmt":"2013-06-10T00:00:00","guid":{"rendered":"http:\/\/otava.test\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/"},"modified":"2013-06-10T00:00:00","modified_gmt":"2013-06-10T00:00:00","slug":"data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/","title":{"rendered":"Data Security Specialist Aims to Minimize Encryption &#8216;Fear and Confusion\u2019 in Upcoming Webinar"},"content":{"rendered":"<figure style=\"width: 90px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" title=\"Chris Heuman\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\" alt=\"Chris Heuman\" width=\"90\" height=\"128\" \/><figcaption class=\"wp-caption-text\">Chris Heuman<\/figcaption><\/figure>\n<p id=\"docs-internal-guid-7d766e80-2f8b-0c99-ede2-6aac779e255f\" dir=\"ltr\">When Chris Heuman started his career in healthcare IT as a computer operator more than 23 years ago, <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> privacy laws were not yet a consideration. As the understanding of the value of protecting patients\u2019 sensitive data grew, Heuman\u2019s career focus narrowed.<\/p>\n<p dir=\"ltr\">He earned certifications as a Certified HIPAA Professional (CHP), Certified Security Compliance Specialist (CSCS) and Certified Information Systems Security Professional (CISSP) to assist healthcare and financial organizations understand and meet the myriad compliance and security regulations and requirements they now face.<\/p>\n<p dir=\"ltr\">\u201cProtecting data was important enough to me that I pushed my career that way and focused on implementing privacy and security controls on the infrastructure side,\u201d Heuman says. \u201cI founded <a href=\"https:\/\/www.riscsecurity.com\/\">RISC Management<\/a> to help healthcare organizations with the privacy and security of regulated and sensitive information for compliance mandates.\u201d<\/p>\n<p dir=\"ltr\">Heuman will bring that expertise to Online Tech\u2019s free webinar series when he presents \u201cEncryption \u2013 Perspective on Privacy, Security &amp; Compliance\u201d at 2 p.m. ET on Tuesday. (For more details and to register, <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">click here.<\/a>)<\/p>\n<p dir=\"ltr\">His is the first of three encryption-focused webinars available in June. On June 18, a webinar discussing <a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-software-level-linux-and-windows\">encryption at the software level<\/a> will be presented. That will be followed by a <a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">hardware and storage-focused webinar<\/a> on June 25.<\/p>\n<p dir=\"ltr\">In his presentation, Heuman will discuss the value of encryption for HIPAA, <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a>, FFIEC and other regulatory frameworks and the successful components of a data security program that integrates encryption. He\u2019ll touch on the legal safe harbors for suitably encrypted data, typical encryption methodologies, how to document your choices and implementation and how to demonstrate a successful program to an auditor.<\/p>\n<p dir=\"ltr\">Heuman says that while more and more people are understanding the concept of effective data encryption, some industries are further along than others. And even in organizations that grasp encryption, there is \u201ca lot of fear and confusion\u201d about understanding what type of encryption is required, what that security provides and communicating the effectiveness to senior management.<\/p>\n<p dir=\"ltr\">\u201cWhat I\u2019m hoping to do is give a plan, a pathway, bullet points to allow attendees to get a better feel for how they can protect data with encryption at their organization,\u201d Heuman said. \u201cAnd if an organization has taken those steps, can they prove data is suitably encrypted to management, auditors and regulatory bodies?\u201d<\/p>\n<p>Read more about encryption in:<\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Federal Health IT Budget Increases by 28 Percent: Encryption, Mobile Security &amp; EHR Safety<\/a><\/em><\/strong><br \/>\nThe proposed federal fiscal 2014 budget calls for a 28 percent increase to support further development of health IT initiatives while taking over where HITECH funding stops (ending in fiscal year 2013). The Office for Civil Rights\u2019 (ONC) funding will \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/federal-health-it-budget-increases-by-28-percent-encryption-mobile-security-ehr-safety\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">2013 State of HIPAA Encryption &amp; Authentication for Healthcare<\/a><\/strong><\/em><br \/>\nAccording to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\">Continue reading \u2192<\/a><\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Encrypting Data to Meet HIPAA Compliance<\/a><\/strong><\/em><br \/>\nTo address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let\u2019s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Chris Heuman started his career in healthcare IT as a computer operator more than 23 years ago, HIPAA privacy laws were not yet a consideration. As the understanding of the value of protecting patients\u2019 sensitive data grew, Heuman\u2019s career focus narrowed. He earned certifications as a Certified HIPAA Professional (CHP), Certified Security Compliance Specialist (CSCS) and Certified Information Systems Security Professional (CISSP) to assist healthcare and financial organizations understand and meet the myriad compliance and security regulations and requirements they now face. \u201cProtecting data was important enough to me that I pushed my career that way and focused on implementing privacy and security controls on the infrastructure side,\u201d Heuman says. \u201cI founded RISC Management to help healthcare organizations with the privacy and security of regulated and sensitive information for compliance mandates.\u201d Heuman will bring that expertise to Online Tech\u2019s free webinar series when he presents \u201cEncryption \u2013 Perspective on Privacy, Security &amp; Compliance\u201d at 2 p.m. ET on Tuesday. (For more details and to register, click here.) His is the first of three encryption-focused webinars available in June. On June 18, a webinar discussing encryption at the software level will be presented. That will be followed by a hardware&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2481","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Security Specialist Aims to Minimize Encryption &#039;Fear and Confusion\u2019 in Upcoming Webinar | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security Specialist Aims to Minimize Encryption &#039;Fear and Confusion\u2019 in Upcoming Webinar\" \/>\n<meta property=\"og:description\" content=\"When Chris Heuman started his career in healthcare IT as a computer operator more than 23 years ago, HIPAA privacy laws were not yet a consideration. As the understanding of the value of protecting patients\u2019 sensitive data grew, Heuman\u2019s career focus narrowed. He earned certifications as a Certified HIPAA Professional (CHP), Certified Security Compliance Specialist (CSCS) and Certified Information Systems Security Professional (CISSP) to assist healthcare and financial organizations understand and meet the myriad compliance and security regulations and requirements they now face. \u201cProtecting data was important enough to me that I pushed my career that way and focused on implementing privacy and security controls on the infrastructure side,\u201d Heuman says. \u201cI founded RISC Management to help healthcare organizations with the privacy and security of regulated and sensitive information for compliance mandates.\u201d Heuman will bring that expertise to Online Tech\u2019s free webinar series when he presents \u201cEncryption \u2013 Perspective on Privacy, Security &amp; Compliance\u201d at 2 p.m. ET on Tuesday. (For more details and to register, click here.) His is the first of three encryption-focused webinars available in June. On June 18, a webinar discussing encryption at the software level will be presented. That will be followed by a hardware...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-10T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Data Security Specialist Aims to Minimize Encryption &#8216;Fear and Confusion\u2019 in Upcoming Webinar\",\"datePublished\":\"2013-06-10T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\"},\"wordCount\":552,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\",\"url\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\",\"name\":\"Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion\u2019 in Upcoming Webinar | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\",\"datePublished\":\"2013-06-10T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security Specialist Aims to Minimize Encryption &#8216;Fear and Confusion\u2019 in Upcoming Webinar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion\u2019 in Upcoming Webinar | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/","og_locale":"en_US","og_type":"article","og_title":"Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion\u2019 in Upcoming Webinar","og_description":"When Chris Heuman started his career in healthcare IT as a computer operator more than 23 years ago, HIPAA privacy laws were not yet a consideration. As the understanding of the value of protecting patients\u2019 sensitive data grew, Heuman\u2019s career focus narrowed. He earned certifications as a Certified HIPAA Professional (CHP), Certified Security Compliance Specialist (CSCS) and Certified Information Systems Security Professional (CISSP) to assist healthcare and financial organizations understand and meet the myriad compliance and security regulations and requirements they now face. \u201cProtecting data was important enough to me that I pushed my career that way and focused on implementing privacy and security controls on the infrastructure side,\u201d Heuman says. \u201cI founded RISC Management to help healthcare organizations with the privacy and security of regulated and sensitive information for compliance mandates.\u201d Heuman will bring that expertise to Online Tech\u2019s free webinar series when he presents \u201cEncryption \u2013 Perspective on Privacy, Security &amp; Compliance\u201d at 2 p.m. ET on Tuesday. (For more details and to register, click here.) His is the first of three encryption-focused webinars available in June. On June 18, a webinar discussing encryption at the software level will be presented. That will be followed by a hardware...","og_url":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/","og_site_name":"OTAVA","article_published_time":"2013-06-10T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Data Security Specialist Aims to Minimize Encryption &#8216;Fear and Confusion\u2019 in Upcoming Webinar","datePublished":"2013-06-10T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/"},"wordCount":552,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/","url":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/","name":"Data Security Specialist Aims to Minimize Encryption 'Fear and Confusion\u2019 in Upcoming Webinar | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png","datePublished":"2013-06-10T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/chris_heuman.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/data-security-specialist-aims-to-minimize-fear-and-confusion-related-to-encryption-requirements-in-upcoming-webinar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Data Security Specialist Aims to Minimize Encryption &#8216;Fear and Confusion\u2019 in Upcoming Webinar"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2481"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2481\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2481"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}