Many hospitals and medical centers are embracing tablets to improve the quality of patient care. With this new mobility, securing Electronic Medical Records (EMR) and demonstrating HIPAA compliance has created new challenges.
This high-impact webcast will present a proven approach to enabling medical staff to leverage their mobile device of choice while protecting EMR and maintaining compliance.
Attend this webinar to:
• Understand the basics of the HIPAA Security Rule
• Construct a checklist to safely embrace mobile devices
• Provide the appropriate staff access to EMR
• Hear how a medical institution embraced NAC and MDM to safely embrace tablets
Organizations in the healthcare industry handle data more sensitive (and valuable) than that of companies in perhaps any other sector. Because of this, those organizations need to demonstrate a heightened standard of data security and privacy. To ensure this, the U.S. has enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA). While use of the cloud affords organizations greater efficiency, it also complicates issues of security and regulatory compliance. But the good news is that solutions that enable cloud and security are available. Join Bitglass and (ISC)2 on November 2, 2017 at 1:00PM Eastern to learn about the requirements of HIPAA and the specific security capabilities that healthcare firms need in order to meet compliance requirements.Read more >
The U.S. Department of Health & Human Services Office for Civil Rights announced on March 21, 2016 that Phase 2 of HIPAA audits have officially begun. A year later, more than 200 desk audits have occurred, however covered entities and their business associates are still struggling to know what to focus on and in which areas they are lacking safeguards.
In this webcast, KirkpatrickPrice’s Joseph Kirkpatrick and LockPath’s Chris Swift will discuss the lessons learned from HIPAA enforcement actions to date and what to expect from the OCR in 2018. Attendees will discover:
• Trends from Phase 1 and 2
• Key takeaways from Phase 2 desk audits
• What the delayed on-site audits means for 2018
• What you can do to proactively prepare for that inevitable knock
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires different rules in the cloud era for staying compliant when it comes to dealing with Protected Health Information (PHI). As a result, IT leaders must adhere accordingly when operating on a public cloud infrastructure, such as Amazon Web Services (AWS), to prevent potential violations and monetary fines.
In this live virtual co-panel discussion by AWS, CorpInfo, and CloudCheckr, we will explore:
- What rules affect HIPAA compliance and governance in the cloud and who must comply
- Why HIPAA compliance requires continuous monitoring and logging of network and information assets
- How to achieve HIPAA compliance with AWS HIPAA Quick Start
- Why organizations need to know and understand AWS’ Shared Responsibility Model to remain compliant in the cloud
- How tools can help validate your security posture and support auditing requirements
Ransomware strains are targeting healthcare providers knowing they will pay to reduce life-threating downtime. Even if the data is restored, do you need to report it as a breach? Were you in violation of HIPAA data protection laws?
Don’t put your reputation and patients at risk! Join our HIPAA expert as he outlines a compliance program that also protects against ransomware attacks.
Our educational webinar focuses on:
The anatomy of HIPAA including the final omnibus rule
How to identify and protect ePHI
The risks and penalties of non-compliance
New strains of ransomware, including their behavior and entry methods
A step-by-step plan for HIPAA compliance and ransomware defense
Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.Read more >
HIPAA compliance. Those words can create a lot of anxiety for hospitals, providers and their business associates - especially when you have to prove you are in compliance. There is good reason for this concern. There is a lot of pressure to demonstrate sound policy and compliance and it can be challenging to do. But it does not have to be.
Whether you are trying to demonstrate compliance yourself or are a vendor with customers who are working to be compliant, this webinar is for you. Join industry experts Chris Apgar, CISSP, and Andy Nieto, Health IT Strategist, for a “how to” session on demonstrating compliance. Topics covered include:
-How to develop a compliance plan
-How to vet potential vendors
-How to audit existing vendors
-Role of data in use and data in motion
-How to document and report
-Checklist for your BAAs
As new HIPAA rules and regulations come into effect at the end of 2013, you may be wondering if you, and your cloud service provider, are really ready. Many of us have fallen into the trap of “HIPAA in a box” claims, but the sad truth is no service provider can get you to HIPAA compliance alone. HIPAA compliance is all about managing risk… who’s managing yours?Read more >
Safe Harbour. EU GDPR, Privacy Shield. Brexit. Model Contract Clauses. And that’s just the international data. HIPAA, SOC2, ISO 270001, PCI.
You’re just trying to keep the systems running and it seems like regulations are changing every day. And, if you’re like 60% of businesses, conservatively, that get audited each year, this may be your lucky year to open those IT books and prove you’ve been compliant all along.
Quickly, your cloud footprint becomes critical. Whether running workloads on the cloud or ensuring your DRaaS meets compliance needs, this extension to your operating environment could land you in trouble if you’re not prepared.
How can you set yourself up for success?
Understand the rules up front – and the ways you can operate within them
Set yourself up with the right documentation to address auditor questions
Arm yourself with a team that has your back
Don’t be the one caught in the audit net. iland’s Director of Compliance, Frank Krieger, has done everything from HIPAA attestations, international Privacy Shield structuring to Model Contract clauses and works with customers every day to ensure their cloud is always audit-ready. He’s joining us in a webinar!
The healthcare industry is one of the top targets for ransomware attacks, and the US Dept. of Health and Human Services Office for Civil Rights (OCR) has now stated that ransomware incidents should be treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA) unless there is substantial evidence to the contrary.
In this webinar, we'll discuss:
-Why the OCR guidelines are important
-Why attackers are going after healthcare firms
-How to detect a ransomware attack
-Steps you can take to protect your organization
Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.
Cloudticity's HIPAA Compliance as a Service, using Chef's automated compliance capabilities on AWS, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef's compliance CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
With healthcare regulations evolving to account for the explosion of mobile devices (BYOD) being used at work, HIPAA compliance is critical for all healthcare organizations who are facing security breaches and hefty fines.
Michelle Caswell, Senior Director of Legal & Compliance at Clearwater Compliance, reviews HIPAA, violations and effective compliance. Having worked as a HIPAA Investigator at the Office for Civil Rights, Michelle brings first-hand understanding and passion to the discussion, focusing on the future of HIPAA and how BYOD solutions affect healthcare organizations’ compliance and patient record safety.
This webinar is hosted by Eli Bronner, Co-founder of Lua - the leading HIPAA compliant messaging solution, and will conclude with a Q&A. Don’t miss the most informative webinar on mobile HIPAA compliance this year!
What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.Read more >
Bill Wildprett shows us how to conduct a HIPAA/HITECH risk assessment using Caliber Security's Security Process Management Suite (SPM).Read more >
Healthcare is experiencing a surge in needing advanced processing and functionality from clinical applications, but has limited capacity to add additional physical servers to accomplish this goal.
The answer has been to move to virtualizing your environment, both locally and in the cloud. At the same time, as this has been occurring, HIPAA security requirements for securing virtual environments have also been expending, alongside with the approach taken by the OCR auditors when reviewing these environments for HIPAA compliance.
Due to the ease of stealing data in non-secured environments, and auditors increasing scrutiny, organizations are at risk of unforeseen side effects along the path to meeting their virtualization goals. But this does not have to be the case.
In this webinar, you will learn the top 3 tips for ensuring you get your needed virtualization capacity, while at the same time maintaining HIPAA compliance along the way.
Executive Vice President of Innovation & Security at Auxilio
Senior Healthcare Strategist at VMware
Vice President of Data Security at HyTrust
This live webcast will take you through the basics of healthcare data security, complying with HIPAA and guidelines for taking action quickly. Our expert panel will cover the basic landscape, and then take your questions in a live Q&A. The session agenda includes:
- Business considerations for health care data security and compliance
- Getting ahead of the curve - key activities for compliance with HIPAA
- Where to get started and how to accelerate your security program
Please join us!
There’s no denying it; malicious data breaches are accelerating. Our personal and payment card data is for sale on black market card shops. We all know that compliance to security and privacy regulations, such as PCI and HIPAA, is more important than ever before. But, many breached organizations ARE compliant. In today’s environment, there are no guarantees: compliance does not equal security. Insiders, malware, and other threats exploit the gaps. Join (ISC)2, Voltage Security and Booz Allen Hamilton on July 24, 2014 at 1:00PM Eastern to find out how you can close the gaps between compliance and security within your organization.Read more >