Health Care 2012 - HIPAA Security Rule Compliance and Risk Analysis: Finding the best ways to reduce security risks and prevent breaches
Date2012-01-31
Deadline2012-01-31
VenuePalo Alto, USA - United States
KeywordsHIPAA; risk assessment; risk analysis; HITECH; PCI; DSS; Security Rule;Breach Notification; meaningful use; regulatory enforcement; willful neglect; security audit; compliance; encryption policies; policy analysis
Topics/Call fo Papers
This 3-hr virtual seminar on HIPAA Security Rule Compliance and Risk Analysis will present an organized and simple approach to perform an effective Information Security Risk Analysis and reduce your organization’s exposure to breaches and penalties. Examples of real situations will be presented and new procedures to reduce risks will be discussed.
Why Should You Attend:
This session will present the background of the regulations that call for information security risk analysis and show how it fits in to an overall information security management process. The risk analysis process will be presented within the context of the overall risk prioritization and risk mitigation process, using an example.
Areas Covered in the Seminar:
- The requirements for Risk Analysis in the Security Rule and for Meaningful Use.
- Definitions of Risk Analysis.
- How to define the scope of a Risk Analysis?
- What goes into a Risk Management process?
- How flexibility should be used in analysis and mitigation of risks?
- Federal guidance on Risk Analysis.
- The NIST Risk Assessment process.
- A non-technical approach to Risk Analysis.
- Typical risk issues and breach causes.
- New enforcement categories and penalties.
- Risk Analysis requirements for Certified EHRs.
- Developing a risk management plan.
- The importance of documentation.
- A Risk Analysis example will be provided, examining a hospital -function and one of its systems.
Why Should You Attend:
This session will present the background of the regulations that call for information security risk analysis and show how it fits in to an overall information security management process. The risk analysis process will be presented within the context of the overall risk prioritization and risk mitigation process, using an example.
Areas Covered in the Seminar:
- The requirements for Risk Analysis in the Security Rule and for Meaningful Use.
- Definitions of Risk Analysis.
- How to define the scope of a Risk Analysis?
- What goes into a Risk Management process?
- How flexibility should be used in analysis and mitigation of risks?
- Federal guidance on Risk Analysis.
- The NIST Risk Assessment process.
- A non-technical approach to Risk Analysis.
- Typical risk issues and breach causes.
- New enforcement categories and penalties.
- Risk Analysis requirements for Certified EHRs.
- Developing a risk management plan.
- The importance of documentation.
- A Risk Analysis example will be provided, examining a hospital -function and one of its systems.
Other CFPs
- DMR & DHR - What Is Really Required
- Design History Files, Device Master Records, Device History Records, and Technical Files / Design Dossiers -- Differences and Similarities
- Medical Device Process Validation - Statistical Considerations
- Application of CAPA in (Device) Sterilization ? For the Non-Expert
- Production and QMS Software Validation - An Excel Example
Last modified: 2011-12-08 21:08:22