Many hospitals and medical centers are embracing tablets to improve the quality of patient care. With this new mobility, securing Electronic Medical Records (EMR) and demonstrating HIPAA compliance has created new challenges.
This high-impact webcast will present a proven approach to enabling medical staff to leverage their mobile device of choice while protecting EMR and maintaining compliance.
Attend this webinar to:
• Understand the basics of the HIPAA Security Rule
• Construct a checklist to safely embrace mobile devices
• Provide the appropriate staff access to EMR
• Hear how a medical institution embraced NAC and MDM to safely embrace tablets
As new HIPAA rules and regulations come into effect at the end of 2013, you may be wondering if you, and your cloud service provider, are really ready. Many of us have fallen into the trap of “HIPAA in a box” claims, but the sad truth is no service provider can get you to HIPAA compliance alone. HIPAA compliance is all about managing risk… who’s managing yours?Read more >
The HIPAA Security Risk Assessment is well intentioned but virtually useless in terms of actually protecting a Covered Entity against a breach. In fact, the majority of the ~1650 Covered Entities on Health and Human Services' HIPAA “Wall of Shame” probably completed their annual SRA, and were likely even “compliant” in terms of the remediation effort. Yet, they suffered breaches that required them to report to HHS, as well as the local news media.
Join us on October 12th at 3 PM EST for "You Just Completed HIPAA Security Risk Assessment – Now Prepare to Be Breached". Guest speaker, and leading healthcare IT expert, Marion Jenkins, will discuss:
- The top five threats and the security practices you can adopt to minimize them
- How to extend the HIPAA Security specifications into actionable items that will safeguard your practice
The healthcare industry is one of the top targets for ransomware attacks, and the US Dept. of Health and Human Services Office for Civil Rights (OCR) has now stated that ransomware incidents should be treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA) unless there is substantial evidence to the contrary.
In this webinar, we'll discuss:
-Why the OCR guidelines are important
-Why attackers are going after healthcare firms
-How to detect a ransomware attack
-Steps you can take to protect your organization
Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.
Cloudticity's HIPAA Compliance as a Service, using Chef's automated compliance capabilities on AWS, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef's compliance CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
With healthcare regulations evolving to account for the explosion of mobile devices (BYOD) being used at work, HIPAA compliance is critical for all healthcare organizations who are facing security breaches and hefty fines.
Michelle Caswell, Senior Director of Legal & Compliance at Clearwater Compliance, reviews HIPAA, violations and effective compliance. Having worked as a HIPAA Investigator at the Office for Civil Rights, Michelle brings first-hand understanding and passion to the discussion, focusing on the future of HIPAA and how BYOD solutions affect healthcare organizations’ compliance and patient record safety.
This webinar is hosted by Eli Bronner, Co-founder of Lua - the leading HIPAA compliant messaging solution, and will conclude with a Q&A. Don’t miss the most informative webinar on mobile HIPAA compliance this year!
New stories of massive HIPAA breaches continue to spring up almost daily. Whether caused by oversight or negligence, fines, lawsuits, and the impact on reputation represent very real threats. Join this webinar to learn the value new communications technologies can provide and how to ensure your patient data and your business remain protected and compliant under HIPAA law.Read more >
What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.Read more >
Image archiving in the cloud- 14 years with no HIPAA Breach - DellRead more >
Bill Wildprett shows us how to conduct a HIPAA/HITECH risk assessment using Caliber Security's Security Process Management Suite (SPM).Read more >
Healthcare is experiencing a surge in needing advanced processing and functionality from clinical applications, but has limited capacity to add additional physical servers to accomplish this goal.
The answer has been to move to virtualizing your environment, both locally and in the cloud. At the same time, as this has been occurring, HIPAA security requirements for securing virtual environments have also been expending, alongside with the approach taken by the OCR auditors when reviewing these environments for HIPAA compliance.
Due to the ease of stealing data in non-secured environments, and auditors increasing scrutiny, organizations are at risk of unforeseen side effects along the path to meeting their virtualization goals. But this does not have to be the case.
In this webinar, you will learn the top 3 tips for ensuring you get your needed virtualization capacity, while at the same time maintaining HIPAA compliance along the way.
Executive Vice President of Innovation & Security at Auxilio
Senior Healthcare Strategist at VMware
Vice President of Data Security at HyTrust
This live webcast will take you through the basics of healthcare data security, complying with HIPAA and guidelines for taking action quickly. Our expert panel will cover the basic landscape, and then take your questions in a live Q&A. The session agenda includes:
- Business considerations for health care data security and compliance
- Getting ahead of the curve - key activities for compliance with HIPAA
- Where to get started and how to accelerate your security program
Please join us!
There’s no denying it; malicious data breaches are accelerating. Our personal and payment card data is for sale on black market card shops. We all know that compliance to security and privacy regulations, such as PCI and HIPAA, is more important than ever before. But, many breached organizations ARE compliant. In today’s environment, there are no guarantees: compliance does not equal security. Insiders, malware, and other threats exploit the gaps. Join (ISC)2, Voltage Security and Booz Allen Hamilton on July 24, 2014 at 1:00PM Eastern to find out how you can close the gaps between compliance and security within your organization.Read more >
Join HOSTING for a roundtable discussion on how to align healthcare operations in the cloud with the compliance regulations required by the 2013 omnibus rule for HIPAA / HITECH. We will provide real world examples of how today’s healthcare organizations have moved to the cloud while achieving HIPAA compliance from multiple perspectives, including: financial costs, impact on clinical research, operations and security solutions, and benefits and challenges of a healthcare cloud.
Our roundtable panel will include Lance Goudzwaard, Chief Commercial Officer for 3tSystems; Johan Hybinette, Chief Information Security Officer for HOSTING; Frank Condon, VP Strategic Alliances for HOSTING; and Sean Bruton, VP Product Management for HOSTING.
Healthcare businesses are rapidly adopting new Cloud technologies to more effectively address their business’ data requirements but are finding that the flexibility delivered by these technologies often obscures the traditional boundaries used to secure sensitive information.
In this on-demand webinar, OnRamp Founder Chad Kissinger discusses how to ensure data availability, security and compliance when moving your IT operations to a Cloud hosted environment.
The evolution to virtualization and the cloud is inevitable. Companies simply have to be more nimble, reach more users and reduce cost as they migrate away from static security controls that are not flexible and cost effective. As amazing as it sounds, this cloud migration can be supported with dynamic security measures and compliance solutions that are more effective and less expensive over time. The cloud is poised to deliver both a more nimble and secure platform for future growth.
In this webinar, with security experts from Coalfire, Fortinet and HyTrust, you'll learn how to leverage the power of cloud computing and enhance security and compliance at the same time.
Topics for discussion include:
•An overview of evolving industry standards and regulations, focusing on HIPAA, FISMA, and the latest PCI DSS 3.0 updates
•The evolving security challenges and approaches with cloud computing
•What recent cyber-attack statistics reveal about the widening gap between the hackers vs. the “good guys”
•Software defined data center architectures, such as VMware NSX, for enabling agile security
•Best practices for assessing risk management, security and compliance
Rick Dakin, CEO of Coalfire
Hemma Prafullchandra, CTO/SVP Products at HyTrust
Warren Wu, Sr. Director of Product Marketing at Fortinet
We look forward to your attendance!