Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    HIPAA CYBER CRIME 2018 - HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover

    View: 136

    Website http://www.mentorhealth.com/control/w_product/~product_id=801203LIVE?ourglocal.com_mar_2018_SEO | Want to Edit it Edit Freely

    Category hipaa cyber security requirements,hipaa security rule checklist,hipaa law,hipaa violation,hipaa regulations 2018,hipaa rules,hipaa violation reporting,HIPAA Cyber Crime

    Deadline: March 12, 2018 | Date: March 13, 2018

    Venue/Country: Online, U.S.A

    Updated: 2018-02-12 18:42:36 (GMT+9)

    Call For Papers - CFP

    Training Options Duration: 60 Minutes

    Tuesday, March 13, 2018 | 10:00 AM PDT | 01:00 PM EDT

    Overview: This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.

    Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.

    Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.

    A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.

    The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.

    Areas Covered in the Session:

    Top Cyber Threats

    Ransomware - New Ransomware threats and old Ransomware tricks that still work

    Why Cyber Criminals target the Healthcare Industry

    The Key HIPAA Rules to Prevent - Prepare - Respond - Recover from a Cyber Attack

    Who Will Benefit:

    Health Care Practice and Business Associate Owners

    Chief Executive Officer

    Chief Operating Officer

    Chief Compliance Officer

    Chief Information Officer

    Chief Information Security Officer

    Compliance Official

    Risk Management Director

    HIPAA Compliance Official

    HIPAA Privacy Officer

    HIPAA Security Officer

    Information Technology Supervisor

    General Counsel - Associate General Counsel

    Attorney

    Certified Public Accountant

    Speaker Profile

    Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.

    Price - $139

    Contact Info:

    Netzealous LLC -MentorHealth

    Phone No: 1-800-385-1607

    Fax: 302-288-6884

    Email: supportatmentorhealth.com

    Website: http://www.mentorhealth.com/

    Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.