Couverture de Compliance Technologies

Compliance Technologies

Compliance Technologies

De : David William Silva
Écouter gratuitement

3 mois pour 0,99 €/mois

Après 3 mois, 9.95 €/mois. Offre soumise à conditions.

À propos de ce contenu audio

Compliance Technologies is a short-form audio series exploring how modern organizations design, implement, and demonstrate compliance in a world shaped by cybersecurity, privacy, regulation, and advanced technologies. Through focused insights, the show reframes compliance as infrastructure, not paperwork, and examines how law, security, risk, operations, and emerging technologies like AI and privacy-enhancing systems work together to build trustworthy, efficient, and verifiable organizations.David William Silva
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • HIPAA Is About Responsibility, Not Just Privacy
      Jan 18 2026

      In this episode of Compliance Technologies, we begin a new series on HIPAA by clarifying what the law actually regulates and what it does not.

      HIPAA is often described as a privacy law, but at its core it defines responsibility for how protected health information (PHI) is created, used, stored, and transmitted across systems and organizations. This episode explains who HIPAA applies to, what qualifies as PHI and ePHI, and why accountability sits at the center of the regulation.

      We explore how HIPAA assigns obligations to covered entities and business associates, why health data naturally flows across modern systems, and how HIPAA’s structure assumes continuous risk assessment rather than one-time compliance.

      If you build, operate, or oversee systems that handle health information, this episode sets the foundation for understanding HIPAA as an operating framework, not a checklist, and why responsibility, not technology, is the starting point.

      Afficher plus Afficher moins
      3 min
    • ISO 27001 as an Operating System for Trust
      Jan 17 2026

      In this episode of Compliance Technologies, we conclude the ISO twenty-seven thousand one series by stepping back and viewing the standard as a whole, not as a certification exercise, but as an operating system for trust.

      After exploring context, risk, control selection, and day-to-day operation of the Information Security Management System (ISMS), this episode explains how ISO/IEC 27001 is designed to help organizations make consistent security decisions over time, even as systems, people, and threats change.

      We discuss why certification is only a point-in-time validation, how the ISMS enables continuity and accountability, and why organizations that truly internalize ISO 27001 shift from “passing audits” to sustaining trust through structured governance and continual improvement.

      If you build, operate, or oversee an ISMS, this episode brings the series together by showing how ISO 27001 functions not as a checklist, but as a durable framework for managing information security at scale.

      Afficher plus Afficher moins
      3 min
    • Operating the ISMS
      Jan 16 2026

      In this episode of Compliance Technologies, we continue the ISO twenty-seven thousand one series by focusing on what happens after design and planning: operating the Information Security Management System (ISMS).

      ISO/IEC 27001 requires more than documented policies and selected controls. It expects the ISMS to function as a living system, supported by competent people, accurate documentation, monitored performance, internal audits, and active management oversight. This episode explores how Clauses 7 through 10 translate risk treatment decisions into daily operations.

      We discuss the roles of competence and awareness, the importance of execution and monitoring, and why internal audit and management review are central to accountability and improvement. Rather than treating these activities as audit preparation, the episode frames them as mechanisms that keep the ISMS effective over time.

      If you build, operate, or oversee an ISMS, this conversation clarifies what ISO 27001 expects once controls are in place and why operating the system well is what ultimately sustains trust.

      Afficher plus Afficher moins
      4 min
    Aucun commentaire pour le moment