tw-Security Employee Directory
IT Services and IT ConsultingKansas, United States11-50 Employees
Since 2003, tw-Security has been a recognized leader and trusted advisor in cybersecurity, privacy, and compliance. We are dedicated solely to helping healthcare organizations (covered entities and business associates) protect their information resources. Our guiding principle: data privacy and information security are the cornerstones to maintaining public trust. Information security and privacy are primarily business issues – not just technology issues. Our recommendations for privacy and security safeguards and controls will be risk-based, cost-effective, and aligned with your priorities, industry-prudent practices, and government requirements. For in-depth technical support, tw-Security partners with Talus Solutions (Talus), a healthcare-focused integrator and professional services firm. Our services include: • Risk analysis, risk/ransomware assessments, risk management • Cybersecurity, data privacy program evaluation • Advisory and strategy services • HIPAA program development, management • Policies and procedures: create/update, and align with standards, frameworks, and regulations. • Breach response planning, breach management consulting, post-breach documentation support • Incidence response preparedness, tabletop exercises, playbooks • Awareness, training, and education • Business impact analysis, disaster recovery/business continuity planning • Virtual/ Interim privacy officer (fractional) • Virtual/ Interim security officer (fractional) • Compliance: HIPAA Audit Program Protocol, GDPR, ISO 27001/2, including ISMS and ISO 22301 BCMS, Health Industry Cybersecurity Practices (HICP), Section 405(d), SSAE 16 Type II, SOC 1 and SOC 2, 42 CFR Part 2 - Substance Use Treatment Confidentiality Regulations, Payment Card Industry Data Security Standard (PCI DSS) • Audit preparation • IoMT/medical device security assessment • Identity access management • Penetration/vulnerability/network/web application security testing • Social engineering and phishing