Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Cost of a HIPAA Data Breach – the Calculus has Changed The Cost of a HIPAA Data Breach – the Calculus has Changed Frederick D. Cox, CISM, CISA, CRISC, CISSP | Director, Information Security Precyse Recorded: May 30 2014 4:00 pm UTC 55 mins
    • The Regulations (Brief overview)
      HIPAA
      HITECH
      - The Security Rule

      - The Privacy Rule

      HIPAA Final Rule (Omnibus) 2013

      Regulatory changes
      - Office of the Inspector General Scathing report on HHS / Office of Civil Rights – a brief summary of their findings, based on only 3 out of 211 passed the audits.

      - HHS Conducts 211 audits in several sectors of HealthCare to see how bad compliance really is in the field

      - HHS Ramps up HIPAA Oversight efforts

      - HHS Issues Omnibus rules

      - ICD-10 New process for coding and billing medical activities is being required (affects Hospital Cash Flow)

      - Meaningful Use – stipulations on how data and processes must function – multiple year implementation time frame, fines associated with missed deadlines.


      Financial Penalties – Class Action Law Suits
      - No Longer just OCR Fines but Class action lawsuits with no cap on fines.


      Demand for Information Security Services
      - Risk assessments (required by HIPAA)

      - Increase in Network vulnerability testing

      - Security consulting services particularly security design and monitoring

      Read more >
    • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Health Security Solutions & Juniper Networks Recorded: Nov 26 2013 12:35 am UTC 63 mins
    • Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

      Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

      But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

      Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

      What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

      Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.

      Read more >
    • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Health Security Solutions & Juniper Networks Recorded: Nov 5 2013 7:00 pm UTC 63 mins
    • Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

      Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

      But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

      Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

      What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

      Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.

      Read more >
    • HIPAA Compliance: Are You Ready? HIPAA Compliance: Are You Ready? Lori Collins, Director of Compliance, Experis™ Healthcare Practice Recorded: Jul 26 2012 3:00 pm UTC 60 mins
    • Now that the Department of Health and Human Services has begun greater enforcement of HIPAA, healthcare payer and provider organizations subject to the law are under increasing pressure to comply with its regulations.

      Compliance with HIPAA practices will only become more important as enforcement continues. Understanding why the regulations were put in place, why they are important, and what this means for your healthcare organization will help you stay ahead of any impending audits.

      Specifically, by participating in this webinar, you’ll learn:
      •Healthcare Compliance Requirements
      •Challenges with HIPAA Compliance
      •Features of Compliance Program Effectiveness
      •Practical Approaches to Compliance Preparedness
      •Why Compliance Matters

      Read more >