Sign for Notice Everyday    Sign Up| Sign In| Link|

Our Sponsors

  • ESTA - Electronic System for Travel Authorization
Receive Latest News

Share Us

HIPAA CYBER CRIME 2018 - HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover

View: 103

Website | Edit Freely

Category hipaa cyber security requirements,hipaa security rule checklist,hipaa law,hipaa violation,hipaa regulations 2018,hipaa rules,hipaa violation reporting,HIPAA Cyber Crime

Deadline: March 12, 2018 | Date: March 13, 2018

Venue/Country: Online, U.S.A

Updated: 2018-02-12 18:42:36 (GMT+9)

Call For Papers - CFP

Training Options Duration: 60 Minutes

Tuesday, March 13, 2018 | 10:00 AM PDT | 01:00 PM EDT

Overview: This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.

Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.

Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.

A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.

The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.

Areas Covered in the Session:

Top Cyber Threats

Ransomware - New Ransomware threats and old Ransomware tricks that still work

Why Cyber Criminals target the Healthcare Industry

The Key HIPAA Rules to Prevent - Prepare - Respond - Recover from a Cyber Attack

Who Will Benefit:

Health Care Practice and Business Associate Owners

Chief Executive Officer

Chief Operating Officer

Chief Compliance Officer

Chief Information Officer

Chief Information Security Officer

Compliance Official

Risk Management Director

HIPAA Compliance Official

HIPAA Privacy Officer

HIPAA Security Officer

Information Technology Supervisor

General Counsel - Associate General Counsel


Certified Public Accountant

Speaker Profile

Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.

Price - $139

Contact Info:

Netzealous LLC -MentorHealth

Phone No: 1-800-385-1607

Fax: 302-288-6884



Webinar Sponsorship:

Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.