Regulatory Compliance

[av_section min_height=’50’ min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=’https://insitenetworks.wpengine.com/wp-content/uploads/2020/02/regulatory-compliance.jpg’ attachment=’3901′ attachment_size=’full’ attach=’scroll’ position=’top left’ repeat=’stretch’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=’hero’ aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-k4cvu6u2′]
[av_three_fourth first min_height=’av-equal-height-column’ vertical_alignment=’av-align-middle’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-k4cvz2wn’ custom_class=”]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text white-heading’ av_uid=’av-k4cvqrff’ admin_preview_bg=”]

Regulatory Compliance

Strengthen security and maintain
regulatory compliance
[/av_textblock]

[/av_three_fourth][av_one_fourth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-eftf3e’ custom_class=”]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” alb_description=” id=” custom_class=” av_uid=’av-k4cvuuf2′]

[/av_codeblock]

[/av_one_fourth]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_margin=’0px’ custom_margin_sync=’true’ custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-cjhaa2′ custom_class=’secondary-background-color’]
[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-aav6yy’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]

Risk Assessments
and Remediation

[/av_textblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]
Gain a true understanding of your company’s regulatory requirements and your compliance towards them with a risk assessment. Many business leaders aren’t aware of the many vulnerabilities that need to be strengthened and aren’t fully secure or compliant.

Our comprehensive Risk Assessment reveals your company’s true vulnerabilities and compliance, which is the first step towards implementing a remediation plan and compliance strategy.

Maximize the security of your company and customer data with our comprehensive Security and Compliance Risk Assessment.
[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-90nba2′]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=” admin_preview_bg=”]

Possibilities

  • Identify, prioritize and address security vulnerabilities
  • Protect against cybersecurity attacks and breaches
  • Achieve and maintain security compliance
  • Avoid compliance penalties and fines
  • Gain peace of mind

[/av_textblock]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=’scroll’ bottom_border_style=’scroll’ margin=” custom_margin=’0px’ scroll_down=” custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ video_mobile_disabled=” overlay_enable=” overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av_element_hidden_in_editor=’0′ av_uid=’av-79506i’]
[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-6fs4ca’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’centered-text’ admin_preview_bg=”]

How Do You Know If
Your Business Is at Risk For
a Cyberattack?

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text compressed-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
A well-known Cybersecurity specialist once said that 50% of all businesses had been breached by a Cyberattack, and the other 50% just didn’t know it yet. Don’t operate your business with a false sense of security thinking that you’re safe from Cyber Criminals that wouldn’t think to infect your systems with Ransomware for a quick and easy payday. Or make your sensitive, personally identifiable company and customer information available for sale on the Dark Web – the criminal side of the Internet. Statistics show that small and medium businesses are the most vulnerable – and have the most to lose.
[/av_textblock]

[/av_one_full]
[/av_section]

[av_layout_row border=” min_height_percent=” min_height=’0′ color=’main_color’ mobile=’av-flex-cells’ id=” av_element_hidden_in_editor=’0′ mobile_breaking=” av_uid=’av-k4cwo4vx’ custom_class=’testimonial-grid’]
[av_cell_two_fifth vertical_align=’top’ padding=’30px’ padding_sync=’true’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=’https://insitenetworks.wpengine.com/wp-content/uploads/2021/08/WU-money-stack.png’ attachment=’3983′ attachment_size=’full’ background_attachment=’scroll’ background_position=’center center’ background_repeat=’stretch’ link=” linktarget=” link_hover=” mobile_display=” custom_class=’grid-cell-image’ av_uid=’av-k4cwxbmp’]

[/av_cell_two_fifth][av_cell_three_fifth vertical_align=’top’ padding=’3%,5%,3%,5%’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_attachment=’scroll’ background_position=’top left’ background_repeat=’no-repeat’ link=” linktarget=” link_hover=” mobile_display=” av_uid=’av-k4cwm5uc’ custom_class=’primary-background-color’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

$14.8M
The average annual cost of non-compliance to businesses.
bitdefender

[/av_textblock]

[/av_cell_three_fifth]
[/av_layout_row]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_margin=’0px’ custom_margin_sync=’true’ custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-3xvga2′ custom_class=’secondary-background-color compressed-content’]
[av_one_full first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2u3hcq’ custom_class=’timeline-content’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

How it Works

[/av_textblock]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-k4cwdgd0′ custom_class=’centered-text’ admin_preview_bg=”]
Security assessments test and evaluate your company’s security preparedness and compliance. They include checks for vulnerabilities in your IT systems and business processes including internal and external vulnerability scans, penetration tests, data scans, network asset scans, Dark Web scans, along with business workflow analysis and end-user email phishing simulations and more.

The results of these assessments are an Executive Summary Report that is an invaluable roadmap towards helping target, prioritize and remediate your vulnerabilities and achieve regulatory compliance.
[/av_textblock]

[/av_one_full][av_one_half first min_height=’av-equal-height-column’ vertical_alignment=’av-align-middle’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-k4cxck3g’ custom_class=”]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’ centered-text security-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Security
Assessment
Checklist
[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’pop-up’ mobile_breaking=” mobile_display=” av_uid=’av-k4cxcp4w’ custom_class=”]

[av_codeblock wrapper_element=” wrapper_element_attributes=” codeblock_type=” av_uid=’av-k4cx708c’ custom_class=’centered-text’]

[/av_codeblock]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=’#0936bc’ background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=” custom_class=’pain-points-section’ aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-dhlmyi’]
[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-cle34q’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-heading’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Pain Points Solved

[/av_textblock]

[/av_one_full][av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-14fty2′]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

  • Identify and Address Security Vulnerabilities
    Our comprehensive Security and Compliance Risk Assessments allow us to quickly identify vulnerabilities and remediate them.
  • Maximize End User Security Awareness
    Our End User Security Awareness Training maximizes your staff’s awareness and expertise in identifying email Phishing and social engineering compromise attempts and the appropriate response.
  • Reach and Maintain Regulatory Compliance
    Attaining and maintaining regulatory compliance is paramount to avoiding cyberattacks, fines and worse.
  • Attain Peace of Mind
    Feel secure that you have undertaken the appropriate steps to safeguard your company and customer data.

[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-9ghvei’]

[av_image src=’https://insitenetworks.wpengine.com/wp-content/uploads/2021/02/Image-1.png’ attachment=’3953′ attachment_size=’full’ copyright=” caption=” styling=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’ hover=” appearance=” link=” target=” title_attr=” alt_attr=” lazy_loading=’disabled’ id=” custom_class=’quote-image’ av_element_hidden_in_editor=’0′ av_uid=’av-k4kax337′ admin_preview_bg=”][/av_image]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

I have been working with INsite Networks for over 20 years. As our IT demands have grown, INsite has been on the ball, providing unparalleled service and support through every need and demand.​”
– ERIC R. ANDRESEN, CPM®, PRESIDENT

[/av_textblock]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=’scroll’ bottom_border_style=’scroll’ margin=” custom_margin=’0px’ scroll_down=” custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ video_mobile_disabled=” overlay_enable=” overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av_element_hidden_in_editor=’0′ av_uid=’av-3xvga2′]
[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-2u3hcq’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text compressed-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Implementation Timeline

To deliver a Security and Compliance Risk Assessment, we’ll conduct a discovery meeting in order to understand your business and its regulatory compliance needs and requirements, along with your current security strategy.

Next, we’ll schedule a series of assessments to scan, analyze and document your current security and network and cloud infrastructure and data along with your users, groups and permissions. We’ll conduct Penetration Testing to identify any external vulnerabilities that can be exploited, as well as test your users on their security awareness by conducting simulated email Phishing activities. Once these processes are complete, we’ll analyze the data and develop and deliver our Executive Summary and recommendations for remediation to you.
[/av_textblock]

[av_hr class=’invisible’ height=’30’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ av_uid=’av-k4kbtqo7′ custom_class=” admin_preview_bg=”]

[/av_one_full][av_one_third first min_height=’av-equal-height-column’ vertical_alignment=’av-align-top’ space=’no_margin’ margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-k4d0whmd’ custom_class=”]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-2′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Discovery Meeting
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Week 1

[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-65pgsa’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-1′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Security and Compliance Assessment
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Weeks 2-4

[/av_textblock]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ highlight=” highlight_size=” border=” border_color=” radius=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_breaking=” mobile_display=” av_uid=’av-4tgpmy’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text step-container time-line-color-4′ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Executive Summary and Recommendations
[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’timeline-steps’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Week 5

[/av_textblock]

[/av_one_third]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_margin=’0px’ custom_margin_sync=’true’ custom_arrow_bg=” id=” color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-k4kb1iey’ custom_class=’form-section’]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” row_boxshadow_color=” row_boxshadow_width=’10’ margin=’0px’ margin_sync=’true’ mobile_breaking=” border=” border_color=” radius=’0px’ radius_sync=’true’ padding=’0px’ padding_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ highlight_size=’1.1′ animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-3awjre’]

[av_image src=’https://insitenetworks.wpengine.com/wp-content/uploads/2021/08/Whtepaper-placeholder-9.png’ attachment=’4015′ attachment_size=’full’ copyright=” caption=” styling=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’ hover=” appearance=” link=’manually,https://fs.honeycrmapp.net/e5150bc3d5434181b933a98e40c16ab4/pw1-compliance.pdf’ target=’_blank’ title_attr=” alt_attr=” lazy_loading=’disabled’ id=” custom_class=” av_element_hidden_in_editor=’0′ av_uid=’av-k4kax337′ admin_preview_bg=”][/av_image]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text wp-heading’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Whitepaper

An Introduction to
Regulatory Compliance

[/av_textblock]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]
Read Whitepaper
[/av_textblock]

[/av_one_half][av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ row_boxshadow_color=” row_boxshadow_width=’10’ link=” linktarget=” link_hover=” padding=’0px’ padding_sync=’true’ highlight_size=’1.1′ border=” border_color=” radius=’0px’ radius_sync=’true’ column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’bottom-to-top’ mobile_breaking=” mobile_display=” av_uid=’av-k4kaw0zd’ custom_class=’form-column’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=’white-heading centered-text’ av_uid=’av-k4cwdgd0′ admin_preview_bg=”]

Questions about
Regulatory Compliance?


[/av_textblock]

[/av_one_half][/av_section]