Compliance

COMPLIANCETRAINING

Customized compliance training for HIPAA, CMMC, NIST, PCI-DSS, and SOC 2 that builds genuine understanding.

CMMC-AB RPO #1449|CMMC-RP Team|BBB A+ Since 2003|DFE #604180|Founded 2002
Curriculum

What Does Compliance Training Cover?

Practitioner-led training built from real-world experience.

HIPAA Training

Privacy, security, and breach notification rules for healthcare organizations and business associates.

CMMC Training

CUI handling, access controls, and security practices for defense contractors and suppliers.

NIST 800-171 Training

Security requirement training aligned with the 110 controls in NIST SP 800-171.

PCI-DSS Awareness

Cardholder data handling, payment security, and PCI compliance for staff.

SOC 2 Controls Training

Security, availability, and privacy control awareness for service organizations.

Annual Refresher Programs

Ongoing compliance education with updated content and phishing simulations.

Process

How Does Compliance Training Work?

01

Assess current knowledge and training needs

02

Customize curriculum for your team and industry

03

Deliver hands-on training with real scenarios

04

Test comprehension and measure outcomes

05

Provide documentation for compliance evidence

06

Schedule ongoing refresher training

Enroll Today

Compliance Courses

Self-paced online courses covering HIPAA, CMMC, and cybersecurity compliance. Start immediately.

HIPAA Rescue Manual for Healthcare Practices

IntermediateHIPAA

Complete HIPAA compliance training for healthcare organizations and business associates. Covers privacy, security, and breach notification requirements.

CMMC 2.0 Implementation Bootcamp

AdvancedCMMC

Full CMMC Level 2 implementation guide covering all 110 NIST 800-171 controls, SSP development, and assessment preparation for defense contractors.

The 39-Layer Cybersecurity Framework

IntermediateCybersecurity

Comprehensive 39-layer security framework that builds the technical foundation needed across CMMC, HIPAA, PCI-DSS, and SOC 2 compliance.

Framework Map

Why Is Compliance Training Not One Single Topic?

Petronella Technology Group runs compliance training for organizations covered by HIPAA, CMMC, NIST 800-171, SOC 2, PCI-DSS, GLBA, and several state-level privacy laws. Each framework has a different definition of who must be trained, what the training must cover, how often it must happen, and what the evidence trail looks like during audit. Treating them as one generic "annual security training" fails on all four of those dimensions, which is exactly why so many organizations pass their training program internally only to get flagged by an external assessor.

HIPAA training requirements in plain English

Every workforce member who accesses protected health information must receive privacy and security training at hire and periodically thereafter. The HIPAA Privacy Rule does not define a fixed interval, but the Security Rule requires a security awareness program with periodic updates. In practice, quarterly phishing simulations paired with annual refresher training satisfies both. Business associates inherit the same obligation. We structure our HIPAA track around the specific roles in your practice: clinicians, front-office staff, billing, IT, and business associates, because each one faces different daily exposures.

CMMC 2.0 training across all three levels

Petronella consults on all three levels of CMMC: Level 1, Level 2, and Level 3. Level 1 covers basic safeguarding under Federal Contract Information. Level 2 aligns with the 110 practices in NIST SP 800-171 and is what most defense suppliers are assessing against. Level 3 layers on a subset of NIST SP 800-172 practices for contractors working on the highest-value controlled unclassified information. As a CMMC-AB Registered Provider Organization (RPO #1449), we teach the specific awareness, incident response, and configuration management practices that assessors will interview your staff about. Training scope depends on which level you are pursuing.

SOC 2 training for service organizations

SOC 2 does not prescribe a curriculum, but Trust Services Criterion CC1.4 requires evidence that personnel are competent to carry out their responsibilities. Auditors read that as security awareness training plus role-specific training for privileged staff. We tailor our SOC 2 module around the scoping memo you share with your auditor so the training record matches the criteria they are going to test.

PCI-DSS awareness for card-handling roles

PCI-DSS v4.0 requirement 12.6 mandates a formal security awareness program with initial and annual training, plus targeted training for personnel who handle cardholder data. We build a two-track module covering general staff awareness and deeper technical training for payment-system operators.

NIST 800-171, SOX, GLBA, and FERPA

Each of these has its own training obligation. SOX Section 404 drives internal-control awareness for accounting and finance roles. GLBA Safeguards Rule requires annual security awareness for financial institutions. FERPA requires training for school employees who handle student records. We map every client against the frameworks they fall under and consolidate overlapping content so staff do not sit through the same lessons four times.

By Role

What Are The Role-Based Compliance Training Paths?

Blanket training wastes time and creates audit gaps. A clinician does not need to learn about firewall configuration, and a system administrator does not need the same HIPAA Privacy Rule overview we give front-office staff. Petronella designs compliance curricula around the actual responsibilities each role performs.

Executive and board-level briefings

Forty-five to ninety minute briefings covering organizational risk, regulatory posture, incident escalation responsibilities, and the legal exposure that flows up when programs fail. Executives leave understanding what questions to ask during board meetings, which is what most auditors are looking for when they interview leadership.

Privileged IT and security staff

Deep technical sessions on access control hardening, logging and monitoring, incident response playbooks, patch management, encryption, and secure configuration baselines. These are the people who hold the keys, so the training must match the depth of their responsibilities. We cover the specific controls their named role is responsible for under each applicable framework.

Healthcare clinical and administrative staff

HIPAA Privacy Rule in practical terms, minimum-necessary principle applied to daily tasks, breach reporting thresholds, patient request handling, and permissible uses and disclosures. We also train on texting, email, and AI tool use in clinical settings because those are the most common sources of modern HIPAA exposures, and our HIPAA compliance consulting engagements consistently flag them as top remediation priorities.

Defense contractor shop floor and engineering

Controlled Unclassified Information identification, marking, handling, storage, transmission, and destruction. We cover the specific CUI categories your contracts reference, because a machine-shop operator and an engineering lead see different CUI and need different muscle memory. All 110 NIST 800-171 controls get mapped to the workforce roles they actually touch.

Finance, accounting, and payment operations

PCI-DSS cardholder data handling, GLBA Safeguards Rule requirements, SOX control awareness for accounting staff, wire-fraud and business-email-compromise recognition drills, and vendor-verification procedures. Finance is one of the highest-risk surfaces in almost every organization, and generic training does not prepare staff for the targeted attacks they actually receive.

Human resources and people operations

Protected-class records handling, background check data, benefits administration, employee monitoring disclosures, and wage-and-hour record retention. HR touches nearly every regulatory framework indirectly and owns several of them outright. Training covers both the data-protection angle and the documentation discipline that audit evidence requires.

Certification

Regulatory Training Certification And Evidence

Training without evidence does not satisfy an auditor. Petronella treats the evidence trail as a core deliverable, not an afterthought. Every program produces artifacts you can hand to an auditor in whatever format they prefer.

  • Individual completion records with timestamp, module version, quiz score, and acknowledgment of the acceptable-use or security policies covered.
  • Curriculum-to-control mapping that crosswalks each training module to the HIPAA, CMMC, NIST 800-171, PCI, or SOC 2 control it satisfies.
  • Attendance logs for live sessions, including remote joins and exit timestamps.
  • Policy acknowledgments captured as part of the completion workflow, not as a separate HR step that rarely happens on time.
  • Refresh and remediation tracking that flags when an employee missed a refresher or failed a post-test, so managers can act before audit.

We also produce a short program narrative for each framework you are preparing against. The narrative explains, in auditor-friendly language, what your training program is, who is covered, how you verify comprehension, what happens if someone fails, and how the records are retained. Most first-time CMMC or SOC 2 assessments fail on narrative clarity, not on underlying practice, and a crisp written description keeps you out of that trap.

Delivery

How Does The Compliance Training Program Run?

Most organizations blend three delivery modes. Petronella coordinates the schedule, the learning platform, and the evidence collection so internal compliance leads do not have to assemble it themselves.

Live cohort workshops

Ninety-minute to full-day sessions delivered in person or over video. Best fit for executive briefings, privileged staff training, and annual refreshers where interaction and scenario work drive retention. Each session ends with a scored knowledge check and a printed or digital acknowledgment of the related policies.

Self-paced learning-platform modules

Short, role-specific video lessons with quizzes, delivered through your existing learning management system or one Petronella provisions for you. These are ideal for onboarding new hires, for annual refreshers, and for distributed workforces where live sessions are hard to schedule. All completion data flows back into the evidence trail automatically.

Tabletop exercises and breach drills

Quarterly or semiannual ninety-minute tabletop exercises for the incident-response team. We run realistic scenarios drawn from current threat intelligence and grade the team on detection, containment, decision-making, and communication. The exercises generate documentation that satisfies the "test your response plan" language in nearly every framework we map against.

Ongoing phishing simulation

Monthly or twice-monthly simulated phishing campaigns, with remedial micro-learning for staff who click. The data feeds your awareness metrics and closes the loop between training and real behavior.

Questions

Compliance Training Questions

How do we scope a training program when we fall under multiple frameworks?
We start with a one-hour framework-overlap workshop, build a consolidated training matrix, and deliver the shared content once with framework-specific addenda for the roles each framework covers. That usually cuts total training hours by thirty to forty percent without losing coverage.
Will this satisfy our cyber insurance carrier requirements?
Most carriers require an annual awareness program, phishing simulation, and privileged-access training. Our program covers all three and produces the evidence packet carriers ask for at renewal. We coordinate with your broker when the carrier has carrier-specific language.
Do you provide content we can deliver internally, or do you run all the sessions?
Both. We deliver live sessions, we license our self-paced modules, and we produce instructor guides for your internal trainers if you prefer to keep delivery in house. Hybrid is common, with us leading the first year and your team taking over refreshers.
How do you handle new hires between annual training cycles?
Every client gets a new-hire onboarding track accessible through the LMS, with automatic enrollment triggered by HR. New hires complete the baseline modules within their first thirty days and are added to the ongoing phishing simulation on day one.
Can you integrate with our existing LMS?
Yes. We export SCORM and xAPI packages that work with Cornerstone, TalentLMS, Docebo, Moodle, and most major learning platforms. We also run our own hosted platform for clients who do not have an LMS.
Framework Deep Dive

Framework-Specific Coverage And Audit Alignment

Compliance training only produces durable value when the content maps cleanly to the controls your auditor will test. Petronella tailors each module to the specific control language your applicable frameworks use, which keeps the evidence trail crisp and prevents the common problem of training that covers the right topics but in the wrong vocabulary.

HIPAA training aligned to 45 CFR Part 164

Our HIPAA track references the specific safeguards in 45 CFR 164.530 for Privacy Rule administrative requirements and 45 CFR 164.308 for Security Rule administrative safeguards. Staff learn the language your audit documentation actually uses, so when a compliance officer writes the training narrative it quotes the same phrasing a regulator or auditor expects. This sounds pedantic and it is, but it consistently shortens audit interviews and prevents the "we train on this but we do not have it documented" finding.

CMMC 2.0 across all three levels

Level 1 training covers the seventeen basic safeguarding practices drawn from FAR 52.204-21. Level 2 training maps to the 110 security requirements in NIST SP 800-171 Revision 2 across fourteen families. Level 3 training adds the subset of NIST SP 800-172 practices relevant to the highest-value controlled unclassified information. As a CMMC-AB Registered Provider Organization (RPO #1449), Petronella continuously updates the material as assessor expectations and the specific interview questions evolve. Staff in assessment-bound organizations leave the training knowing what they are likely to be asked and how to answer accurately in plain English.

SOC 2 across the Trust Services Criteria

SOC 2 coverage runs across Security, Availability, Processing Integrity, Confidentiality, and Privacy. We help you identify which TSCs your scope actually includes, then tailor the training to the control categories relevant to each. Staff get role-specific modules that reference the specific criteria codes (CC1.4 for competence, CC6.1 for access, CC7.2 for system monitoring, and so on) so when an auditor asks about evidence of training against a specific criterion, the answer is already documented.

PCI-DSS v4.0 requirement 12.6

Our PCI-DSS module references requirement 12.6.1, 12.6.2, and 12.6.3 specifically, covering the formal program, initial and annual training, and acknowledgment. Payment-handling staff receive the deeper technical content required by 12.6.3.2 for personnel in targeted roles. Training records plug directly into the evidence packet PCI assessors ask for during the ROC or SAQ process.

State privacy laws and evolving requirements

California CCPA and CPRA, Virginia CDPA, Colorado, Connecticut, Utah, and the steadily growing list of state privacy statutes each carry training or staff-awareness expectations. We maintain a single integrated privacy module that covers the shared content once and layers state-specific addenda for the staff each statute reaches. When a new state goes live, we ship an update and a short refresher that slots into the next quarterly rotation.

After Training

What Stays With Your Organization

The point of a compliance training engagement is not the workshop week. It is the durable capability your organization keeps after we leave. Petronella designs each engagement so the artifacts and the skills stay with your team.

  • Written curriculum. You own the slide decks, instructor guides, quizzes, and knowledge checks for the content we deliver. Your internal trainers can deliver refresher sessions without us in the room.
  • LMS-ready modules. SCORM and xAPI packages that work with most major learning platforms. Your LMS becomes the long-term training system of record.
  • Policy templates. Acceptable use, data classification, incident reporting, acceptable AI use, and remote-work security policy templates that match the training content and the controls you are aligning against.
  • Evidence packet templates. The layout auditors want, the format you can fill out quarterly, and the narrative text that explains your program in auditor-friendly terms.
  • A living vendor-training kit. If you have business associates, subcontractors, or critical vendors, you get a kit you can send them so their training aligns with yours. Reduces the contagion problem where your compliance ends at your border and a vendor's behavior drags you back out of scope.
  • A ninety-day follow-up. Once the initial rollout is done, we schedule a ninety-day check-in covering actual adoption, any gaps that surfaced, and adjustments to the calendar. Most clients find value in continuing the check-in quarterly thereafter.

When an engagement becomes an ongoing relationship

Some clients keep Petronella as a long-term training partner, running the calendar year after year, updating the content as frameworks evolve, and delivering the annual refresher cycle as a managed service. Others take the package, train internal trainers, and run the program entirely in house. Both are perfectly reasonable, and we build every engagement so either path is possible without rework. Clients who stop using us always leave with everything they need to keep running, and clients who continue always know exactly what they are paying for.

Working with your existing advisors

Most mid-market and enterprise clients already have a compliance or audit advisor, outside counsel, and in many cases an MSP or MSSP. We work with those advisors, not against them. Our training complements the controls work your advisors deliver, and we coordinate directly with them during scoping so the training narrative matches the control narrative they are building. This coordination prevents the common problem where training content says one thing and the SOC 2 control language says another, which is almost always caught during the first audit interview and costs everyone time to reconcile.

Budgeting for a durable compliance training program

Compliance training is not a one-time purchase. Budget planning should account for the initial rollout, the annual refresher cycle, ongoing phishing simulation, tabletop exercises, vendor-training kits, content updates as frameworks evolve, and the internal time your compliance lead and HR partner spend on the program. Petronella writes budgets that itemize each of these categories so finance partners can see where the money goes and plan multi-year commitments. Clients who budget three years of the program up front tend to secure better pricing, and they tend to avoid the mid-year funding gaps that cause training programs to lapse precisely when regulators and insurers start asking for evidence.

Training as a recruiting and retention signal

In regulated industries, employees increasingly evaluate employers on the seriousness of the compliance program they operate. A published training commitment, documented role-based curriculum, and genuine evidence of leadership participation all show up in candidate reference checks. Several of our clients have told us that their training program became a modest but real recruiting advantage, particularly for experienced hires joining from organizations with weaker programs. The hiring dimension is rarely the primary reason to invest, but it is a real secondary benefit worth acknowledging.

Tracking regulatory change throughout the year

Regulations do not wait for your annual training cycle. HIPAA clarifications, CMMC assessor-expectation updates, new state privacy statutes, FTC amendments, and international guidance all arrive on their own schedules. We subscribe to the regulator and industry sources that matter for each client's scope and push short change notes to the compliance lead whenever something relevant moves. Change notes include a plain-English summary, the specific training modules that need to be adjusted, and the recommended communication to staff. Clients decide whether to fold the update into the next quarterly refresh or push an immediate micro-training session. Either way, the decision is informed, not reactive.

A note on fear-based compliance training

Some vendors sell compliance training built entirely on scare tactics, walking participants through graphic breach scenarios and implying that every mistake will end the organization. That approach produces short-term attention and long-term disengagement. Employees come to dread the training, tune out when it arrives, and stop reporting near-misses because they associate the topic with punishment. Petronella deliberately writes content that treats staff as adults pursuing shared goals. We explain the rules, we explain why the rules exist, we explain what happens when the rules are broken, and we move on. The tone is professional, direct, and respectful. Adoption data across our client base consistently outperforms the fear-based alternative, which is why we continue to recommend this approach.

Get Started

Ready to Train Your Team?

Start with a free course or contact us for enterprise compliance training packages.

Or call (919) 348-4912 to speak with a training advisor