2014 - Information System Activity Review: Establishing Criteria for Reporting to Every Level of the Organization
Date2014-02-26
Deadline2014-02-25
Venueonline event, USA - United States
Keywordsonline healthcare trainings; online hipaa training; Medical Training
Websitehttps://bit.ly/1cvopTU
Topics/Call fo Papers
Overview: Everyone that has access to Protected Health Information has a role in activity review monitoring. The user may need to monitor activity under their login, supervisors, managers and directors should understand what is happening within their departments, security personnel must know and understand what they should be reviewing, the management of the organizations should know what is being reviewed,why it is being reviewed and what that means to the organization. This session will include activity review at the application and network layer.
Audit logs and information can be found at the network, server and application level and all levels of the organization should be aware of the importance of these activity reviews. This includes every employee to the board of the company. This session will explore the type of information everyone should be aware of and methods to communicate this to them. When actively reviewing access reports this session will discuss methods to accomplish this important task.
Why should you attend: The HIPAA Security Management Standard is the foundation of the security rule and it requires organizations to - Implement procedures to regularly review records of information system activity, such as:
Audit logs;
Access Reports; and
Security incident tracking reports
In this session we will review what audit logs should be reviewed and why, how to review access reports and what construes a security incident and why and how an organization should review them. In addition, this session will discuss what information should be communicated to various levels within the organization. Security is everyone’s responsibility and understanding what can be reviewed and by whom is critical.
Areas Covered in the Session:
Why it is important to review this information
Who should be involved in this review
What information should be reviewed
How to obtain this information
Who Will Benefit:
Information Security Officers
IT Management
Compliance and Privacy Officers
Risk Managers
IT/IS Management and Staff
Contract Management Department
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Miaoulis contributes to the industry by frequently speaking at conferences on security matters, including recent sessions on Risk Analysis/Risk Management, Creating and Implementing Effective Security Policies, Understanding the HIPAA Security Rule, and Creating Effective Security Incident Response Procedures. Miaoulis has been interviewed and quoted by numerous publications including: SC Magazine, Health Data Management, Briefings on Healthcare Security, Computerworld; and Health Information Compliance Insider. Miaoulis has worked with AHIMA to produce the book “Preparing for a HIPAA Security Compliance Assessment” and also has worked on updating the AHIMA Security Practice Briefs.
MentorHealth
webinars-AT-mentorhealth.com
Phone No: 800-385-1607
FaX: 302-288-6884
Event Link: http://bit.ly/1cvopTU
Audit logs and information can be found at the network, server and application level and all levels of the organization should be aware of the importance of these activity reviews. This includes every employee to the board of the company. This session will explore the type of information everyone should be aware of and methods to communicate this to them. When actively reviewing access reports this session will discuss methods to accomplish this important task.
Why should you attend: The HIPAA Security Management Standard is the foundation of the security rule and it requires organizations to - Implement procedures to regularly review records of information system activity, such as:
Audit logs;
Access Reports; and
Security incident tracking reports
In this session we will review what audit logs should be reviewed and why, how to review access reports and what construes a security incident and why and how an organization should review them. In addition, this session will discuss what information should be communicated to various levels within the organization. Security is everyone’s responsibility and understanding what can be reviewed and by whom is critical.
Areas Covered in the Session:
Why it is important to review this information
Who should be involved in this review
What information should be reviewed
How to obtain this information
Who Will Benefit:
Information Security Officers
IT Management
Compliance and Privacy Officers
Risk Managers
IT/IS Management and Staff
Contract Management Department
William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.
Miaoulis contributes to the industry by frequently speaking at conferences on security matters, including recent sessions on Risk Analysis/Risk Management, Creating and Implementing Effective Security Policies, Understanding the HIPAA Security Rule, and Creating Effective Security Incident Response Procedures. Miaoulis has been interviewed and quoted by numerous publications including: SC Magazine, Health Data Management, Briefings on Healthcare Security, Computerworld; and Health Information Compliance Insider. Miaoulis has worked with AHIMA to produce the book “Preparing for a HIPAA Security Compliance Assessment” and also has worked on updating the AHIMA Security Practice Briefs.
MentorHealth
webinars-AT-mentorhealth.com
Phone No: 800-385-1607
FaX: 302-288-6884
Event Link: http://bit.ly/1cvopTU
Other CFPs
- Information, Tools and Tips for Ensuring Compliance with the HIPAA Privacy, Security and Breach Notification Laws in 2014
- How to Develop a Set of HIPAA Policies and Procedures - Webinar By MentorHealth
- Business Metrics for Health Care Organizations
- Could I? Should I? Expanding Your Nursing Practice to the Legal Arena as a Life Care Planner
- CMS Hospital Nursing CoP Standards 2014 - Webinar By MentorHealth
Last modified: 2014-01-10 15:56:55