ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Healthcare Training 2019 - Security Risk Assessment - Why Should it be done, and How Best to do it!

Date2019-07-16

Deadline2019-07-16

VenueOnline Event, USA - United States USA - United States

KeywordsHealthcare training; Healthcare; FDA regulations

Websitehttps://www.mentorhealth.com/webinar/-80...

Topics/Call fo Papers

Overview:
A risk assessment is the first step for any organization to take in developing their plan to protect their health card data and systems
It is a thorough analysis and categorization of the organization's data, computer software, hardware, physical location, and employee access and responsibilities. In a detailed step by step process, each of these areas is catalogued, and then potential vulnerabilities are identified, along with the impact of that vulnerability and its likelihood of happening.
Costs of the vulnerability, as well as potential costs to remediate against that vulnerability must also be determined. Given this information, the organization can then make good decisions on what type of a security program is necessary, how does it fit within the organization's budget,capabilities and strategic plan, and what the next steps are.
Why should you Attend: How do you know your entity is protected against security threats, computer viruses, data breaches, and shutdowns? Where do you even start? The risk assessment is the basis for all of your security plans, procedures and policies. Without such an assessment, you do not know what data and systems are at risk, what you currently have in place, and where you may be vulnerable.
You may not even know where to start. And, you are at risk of HIPAA violations and losing CMS funding for your Electronic Health Record activities. Any entity who has not done risk assessments on a regular basis (at least once a year) has an issue and should be listening to this webinar
Areas Covered in the Session:
Definition of Risk Assessment
Federal Regulatory and Compliance Requirements for the Assessment
Identifying what Needs to be Assessed
Defining the Data that an Organization Holds
Looking at Internal Systems
Identifying Vendors and Partners and their Risks
Risk Assessment Tools
How to Prioritize your Risks and Remediation
Who Will Benefit:
Security
Privacy Officers
CIOs
CSOs
Physician Office Managers
Health Care Provider Managers
Stanley Nachimson - MentorHealth Speaker Profile
Stanley Nachimson is principal of Nachimson Advisors, a health IT consulting firm dedicated to finding innovative uses for health information technology and encouraging its adoption.
Event link: https://www.mentorhealth.com/webinar/-801689LIVE?c...
Contact Info:
Netzealous LLC - MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: mentorhealth84-AT-gmail.com
Website: http://www.mentorhealth.com/

Last modified: 2019-05-29 19:42:24