The 2016 election's impact on policy implications of HIPAA enforcement and other patient privacy, security and compliance regulations.
Part 3 of a 3 part series hosted by FairWarning Managed Privacy Services
Part 1 of a 3 part series hosted by FairWarning Managed Privacy Services
Hear Epic customer, Cooper University Health Care share how they protect the “crown jewels” of their facility – the patient information – by starting each day looking for the adversary.
Beating a breach is all about assuming it has already happened. Hear how a customer is combating sleepless nights by starting each day looking for the adversary.
Iliana Peters provided an overview of why enforcement is a critical component to protecting and securing ePHI; the latest information on the breaches that are being reported to OCR; details on access guidance; and what the ultimate enforcement penalties will be.
From the Front Lines: Navigating the OCR Phase 2 HIPAA Audits, Featuring Beacon Health System and Trish Markus, Esq.
Learn how to prepare for the OCR phase 2 HIPAA Audits with FairWarning and best practices for regulatory health information technology, security, and privacy issues.
Learn why an attorney may want access to your Salesforce data – and general tools for how you can protect your most sensitive data that’s stored in your cloud-based CRM systems.
The cloud has empowered employees to circumvent IT and enabled shadow IT to pop-up throughout organizations of all sizes. It’s nearly impossible for the IT staff to get their arms around all of the different applications that are being downloaded by employees. Hear from one of the world’s leading CISOs, Gene Fredriksen, on how he has manages shadow IT
Security threats to the healthcare industry have reached unprecedented levels. Insider “snooping” has been joined by an entourage of nefarious allies, including: nation state attacks, hacktivists, international identity theft rings, and ransomware. Cybersecurity solutions that provide faster, more efficient detection of anomalous activity are necessary to safeguard EHRs and healthcare applications.