Top
 

Speaking (New)

Contact us at RestAssured@SunsetSecure.com if you are interested in Sunset Technologies speaking at your event.

Our Speaking Topics

CyberProtection

Course Description:
In this presentation, we will define, identify, and discuss some of the scams, cyber-attacks, and identity thefts that you would most likely encounter. We will examine and evaluate what your Risk Level Tolerance is and what that means for your practice. We will analyze the Dark Web and BitCoin to discuss its ramifications. In conclusion, we will provide practical and applicable steps to integrate into your practice to help protect yourself.

Request More Info

Learning Objectives:
Define, identify and discuss scams, cyber-attacks, and identity thefts
Evaluate your Risk Tolerance
Explore the Dark Web: What is it? Why is it there? What people do on it?
Integrate practical steps to protect yourself and your
practice

HIPAA

Course Description:
In this presentation, we will identify and discuss how HIPAA has and is currently changing the landscape in which we all work. We will examine and evaluate the four parts necessary to protect your client’s Personal Health Information (PHI). We will review and compose a list of the common vulnerabilities and non-compliance and how your practice can keep ahead of these concerns. In conclusion, we will provide practical and applicable steps to integrate into your practice to help protect yourself.

Request More Info

Learning Objectives:
Identify and discuss how HIPAA has and is changing
Evaluate the four parts necessary to protect PH
Compose a list of Common Vulnerabilities &
Non-Compliance
Provide practical applicable directions for immediate implementation in which to deploy HIPAA requirements in your practice.

Dental Practice IT, HIPAA, and Data Security

Course Description:
In this presentation, we delve a little deeper into HIPAA. We identify and discuss how HIPAA has and is currently changing the landscape in which we all work. We will examine and evaluate the four parts necessary to protect your client’s Personal Health Information (PHI). We will analyze the Dark Web and BitCoin to discuss its ramifications and analyze the mobile expansion with its effects on data security. We will review and compose a list of the common vulnerabilities and non-compliance and how your practice can keep ahead of these concerns. Have you ever wanted to know what really happens after a data breach? You can learn here. In conclusion, we will provide practical and applicable steps to integrate into your practice to help protect yourself.

Request More Info

Learning Objectives:
Identify and discuss how HIPAA has and is changing
Evaluate the four parts necessary to protect PHI
Explore the Dark Web: What is it? Why is it there? What people do on it?
Examine applicable steps to keep you and your practice safe
Analyze how the mobile explosion affects data security
Compose a list of Common Vulnerabilities &
Non-Compliance
Review what happens after a data breach
Provide practical applicable directions for immediate implementation in which to deploy HIPAA requirements in your practice.