Risk Analysis 2013 - Risk Analysis to Meet Meaningful Use and HIPAA-HITECH - Webinar By MentorHealth
Date2013-11-19
Deadline2013-11-19
Venueonline event, USA - United States
Keywordsonline healthcare trainings; Risk Analysis; Risk Management
Websitehttps://bit.ly/GKjyCF
Topics/Call fo Papers
Overview: This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.
The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This presentation will provide information about how to determine where the risks to the organization exist and point organizations to where to look for this information. Once information asset locations have been identified, then the risk and safeguards to that information can be explored. Risk assessments are a key part of effective risk management and facilitate decision making at all three tiers in the risk management hierarchy including the organization level, mission/business process level, and information system level.
This presentation will explore risks at all levels including network, application and organizational risks.
Why should you attend: The HIPAA security rule requires every covered entity (CE) to conduct a risk analysis to determine security risks and implement measures "to sufficiently reduce those risks and vulnerabilities to a reasonable and appropriate level." In addition to attest for Meaningful Use and organization must complete a HIPAA Risk Analysis and implement a Risk Management Program. All levels of the organizations must be involved in security and Risk Analysis / Risk Management provides the mechanism to ensure organizations prioritize risk appropriately and address the highest risk to the confidentiality, integrity and availability of electronic Protected Health Information.
There are processes and methods that can assist organizations prioritize IT security projects which address the highest risks to the organization.
Covered entities must make security decisions on what is appropriate for their specific environment and risk analysis is the tool to ensure that risk mitigation activities are reasonable for a specific environment.
This presentation reviews the regulatory requirements for security risk analysis and management, provides an overview of the types of risk analysis that can be performed, and offers a practical approach on how to comply with these requirements.
Areas Covered in the Session:
Locate the data, and then conduct a risk analysis.
Define Reasonable By Using NIST and CMS Guidance as a Guide
Risk Analysis Steps
Identify the scope of the specific analysis;
Gather Data
Identify and document potential threats and vulnerabilities;
Assess and document current security measures;
Determine the likelihood of threat occurrence;
Determine the potential impact of threat occurrence;
Determine the level of risk; and
Identify potential security measures and finalize documentation
Risk Management Steps
Develop and implement a risk management plan;
Implement security measures; and
Evaluate (monitor) and maintain security measures.
Risk Mitigation or Acceptance Options
Define Reasonable by Using the HIPAA Regulation as a Guide:
The size, complexity, and capabilities of the covered entity
The covered entity's technical infrastructure, hardware, and software security capabilities
The probability and criticality of potential risks to EPHI
Who Will Benefit:
Information Security Officers
Compliance Officers
Chief Information Officers
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Event Link: http://bit.ly/GKjyCF
webinars-AT-mentorhealth.com
Phone No: 800-385-1607
FaX: 302-288-6884
The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This presentation will provide information about how to determine where the risks to the organization exist and point organizations to where to look for this information. Once information asset locations have been identified, then the risk and safeguards to that information can be explored. Risk assessments are a key part of effective risk management and facilitate decision making at all three tiers in the risk management hierarchy including the organization level, mission/business process level, and information system level.
This presentation will explore risks at all levels including network, application and organizational risks.
Why should you attend: The HIPAA security rule requires every covered entity (CE) to conduct a risk analysis to determine security risks and implement measures "to sufficiently reduce those risks and vulnerabilities to a reasonable and appropriate level." In addition to attest for Meaningful Use and organization must complete a HIPAA Risk Analysis and implement a Risk Management Program. All levels of the organizations must be involved in security and Risk Analysis / Risk Management provides the mechanism to ensure organizations prioritize risk appropriately and address the highest risk to the confidentiality, integrity and availability of electronic Protected Health Information.
There are processes and methods that can assist organizations prioritize IT security projects which address the highest risks to the organization.
Covered entities must make security decisions on what is appropriate for their specific environment and risk analysis is the tool to ensure that risk mitigation activities are reasonable for a specific environment.
This presentation reviews the regulatory requirements for security risk analysis and management, provides an overview of the types of risk analysis that can be performed, and offers a practical approach on how to comply with these requirements.
Areas Covered in the Session:
Locate the data, and then conduct a risk analysis.
Define Reasonable By Using NIST and CMS Guidance as a Guide
Risk Analysis Steps
Identify the scope of the specific analysis;
Gather Data
Identify and document potential threats and vulnerabilities;
Assess and document current security measures;
Determine the likelihood of threat occurrence;
Determine the potential impact of threat occurrence;
Determine the level of risk; and
Identify potential security measures and finalize documentation
Risk Management Steps
Develop and implement a risk management plan;
Implement security measures; and
Evaluate (monitor) and maintain security measures.
Risk Mitigation or Acceptance Options
Define Reasonable by Using the HIPAA Regulation as a Guide:
The size, complexity, and capabilities of the covered entity
The covered entity's technical infrastructure, hardware, and software security capabilities
The probability and criticality of potential risks to EPHI
Who Will Benefit:
Information Security Officers
Compliance Officers
Chief Information Officers
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Event Link: http://bit.ly/GKjyCF
webinars-AT-mentorhealth.com
Phone No: 800-385-1607
FaX: 302-288-6884
Other CFPs
- Revising Privacy Practices to Meet HIPAA Omnibus Requirement - Webinar By MentorHealth
- CPT Evaluation & Mgmt Coding Basics: Refreshing your Skills ? Part 1 - Webinar By MentorHealth
- OSHA Injury and Illness Recordkeeping Analysis - Webinar By MentorHealth
- The Evolving Role of Physician Leadership in Health Care - Webinar By MentorHealth
- The Federal False Claims Act: Enforcement and the Obamacare Expansion - Webinar By MentorHealth
Last modified: 2013-10-10 14:14:10