Third Rock
  • Home
  • Compliance
    • Regulations
    • Assessments
    • Cyber Scans
  • Solutions
    • Virtual Services
    • Risk Mitigation
    • Audit Response
    • Incident Response
    • Cybersecurity Training
    • HIPAA Training
  • Industry
    • Finance
    • Government
    • Healthcare
    • Insurance
    • Legal
    • Technology
  • Resources
    • Case Studies
    • Presentations
    • Blogs
    • Events
    • News
  • Vendor Compliance
Select Page

Am I a Data Processor or a Data Controller? – Check the GDPR glossary

by Julie Rennecker, PhD, BSN | May 30, 2018 | Risk Assessment

Ok, so the GDPR “deadline” has passed, but many of you are still tying up loose ends – or perhaps just discovering that the law applies to you! Whatever the case, don’t let confusion over a few terms slow your progress. Some vendors got...

The GDPR deadline is here – are you ready?

by Julie Rennecker, PhD, BSN | May 25, 2018 | Risk Assessment

If you are not yet GDPR-ready, you’re not alone. Many companies are still scrambling to meet the requirements. Some U.S.-based companies didn’t realize the law would apply to them. Others did not realize the full extent of the law – or of their...

Key Themes at Texas Health Care Security & Technology Conference

by Julie Rennecker, PhD, BSN | May 8, 2018 | Risk Management

Last month Robert Felps and I were fortunate to attend THA’s inaugural Texas Health Care Security & Technology Conference. Great speakers, wonderful host and facility, collegiate atmosphere – a great learning experience overall. Hats off to Fernando Martinez,...

National Nurses Week 2018 – Nurses: Inspire. Innovate. Influence

by Julie Rennecker, PhD, BSN | May 8, 2018 | Cyber Security

Third Rock would like to take this chance to salute the nation’s Nurses for their role in patient safety – clinical safety, physical safety, and cyber safety. It’s nurses of all types who are on the front lines of protecting patients from cyber...

Are you Cyber Confident?

by Julie Rennecker, PhD, BSN | Mar 27, 2018 | Compliance & Security

In our conversations with healthcare practice managers and CIOs – whether at small-to-medium practices, dental offices, outpatient facilities, or hospitals – we’ve found that few leaders feel confident in their organization’s ability to protect...
« Older Entries

Search

© 2022 Third Rock, Inc.

About Us

  • Our Story
  • Strategic Partners
  • Leadership
  • Careers

Company Info

  • Contact Form
  • Privacy Policy
  • Cookie Policy

Social

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}