Training

Fraud Management & Cybercrime , Fraud Risk Management , Healthcare

IT Security Risk Analysis for Meaningful Use: What We've Learned

IT Security Risk Analysis for Meaningful Use: What We've Learned
Safeguarding protected health information (PHI) from data breaches has become a critical risk management issue for all healthcare organizations. Over the past 18 months, Redspin, Inc. an expert IT security firm, has helped more hospitals meet the Security Risk Analysis requirement of the EHR Meaningful Use Incentive Program than any other professional services provider.

In this exclusive webinar, Dan Berger, Redspin's President and CEO, will share his "real world" observations and insights on the security risk analysis process and how it can most benefit your organization.

Attend this webinar to gain answers to the following questions:

See Also: Ponemon Report: The Impact of Ransomware on Patient Safety and the Value of Cybersecurity Benchmarking

  • What are the 3 most important steps you can take to safeguard PHI from data breach?
  • How can an IT security risk analysis better prepare an organization for OCR audits and avoid enforcement actions?
  • What proactive steps can a hospital take in regard to the risk of breach by business associates?
  • How do the Stage 2 Meaningful Use security risk analysis requirements differ from Stage 1?

Background

Prompted by the EHR Meaningful Use Incentive Program, many hospitals and eligible providers are taking a fresh look at the HIPAA Security Rule requirement for regular IT security risk analysis (SRA). Nearly 100 hospitals have chosen Redspin to help them conduct their SRA and attest to meaningful use. While engaging an external firm is not mandatory, it enables healthcare providers to more efficiently use their internal resources while leveraging expertise that they may not have in-house.

In this webinar, Dan Berger, Redspin's President and CEO, will share his company's vast experience helping healthcare organizations meet the requirements of the HIPAA Security Rule. See how compliance with regulations is necessary but not sufficient as it relates to safeguarding PHI from data breaches. Learn why even the SRA itself is only a first step - and how reducing IT security risk requires an ongoing process of testing, remediation, validation and re-testing. See how web applications, business associates, and mobile/BYOD are often overlooked as security risks yet pose significant threats. Gain a deeper understanding for how to make IT security an integral part of your overall risk management program and corporate culture.

Redspin promotes Meaningful Healthcare IT Security ® - a process-driven approach for healthcare firms to achieve continuous and durable improvements in IT security. The program provides a systematic reduction of vulnerabilities over time, even as organizations add new employees, systems, applications and customers.

Attend this webinar to gain answers to the following questions:

  • What is the best governance strategy to employ to reduce IT security risk?
  • Which 3 common areas of IT security vulnerability are the most prevalent in the healthcare industry?
  • How can healthcare providers better prepare themselves as enforcement of HIPAA increases (audits, breach penalties, resolution agreements)?
  • Beyond the SRA: How can health organizations deal with new areas of risk such as applications, business associates, mobile and BYOD?
  • How can healthcare providers promote a "culture of compliance," or better yet, "a culture of security?"

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.