HIPAA Cyber Crime 2018 - HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover
Date2018-03-13
Deadline2018-03-12
VenueOnline, USA - United States
KeywordsHipaa security rule checklist; Hipaa law; Hipaa violation
Topics/Call fo Papers
Training Options Duration: 60 Minutes
Tuesday, March 13, 2018 | 10:00 AM PDT | 01:00 PM EDT
Overview: This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.
Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.
Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.
The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.
Areas Covered in the Session:
Top Cyber Threats
Ransomware - New Ransomware threats and old Ransomware tricks that still work
Why Cyber Criminals target the Healthcare Industry
The Key HIPAA Rules to Prevent - Prepare - Respond - Recover from a Cyber Attack
Who Will Benefit:
Health Care Practice and Business Associate Owners
Chief Executive Officer
Chief Operating Officer
Chief Compliance Officer
Chief Information Officer
Chief Information Security Officer
Compliance Official
Risk Management Director
HIPAA Compliance Official
HIPAA Privacy Officer
HIPAA Security Officer
Information Technology Supervisor
General Counsel - Associate General Counsel
Attorney
Certified Public Accountant
Speaker Profile
Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.
Price - $139
Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support-AT-mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-spons...
Tuesday, March 13, 2018 | 10:00 AM PDT | 01:00 PM EDT
Overview: This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.
Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.
Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.
The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.
Areas Covered in the Session:
Top Cyber Threats
Ransomware - New Ransomware threats and old Ransomware tricks that still work
Why Cyber Criminals target the Healthcare Industry
The Key HIPAA Rules to Prevent - Prepare - Respond - Recover from a Cyber Attack
Who Will Benefit:
Health Care Practice and Business Associate Owners
Chief Executive Officer
Chief Operating Officer
Chief Compliance Officer
Chief Information Officer
Chief Information Security Officer
Compliance Official
Risk Management Director
HIPAA Compliance Official
HIPAA Privacy Officer
HIPAA Security Officer
Information Technology Supervisor
General Counsel - Associate General Counsel
Attorney
Certified Public Accountant
Speaker Profile
Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.
Price - $139
Contact Info:
Netzealous LLC -MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support-AT-mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-spons...
Other CFPs
- Best Practices for Engaging Your Board and Compensation Committee in Physician Compensation Oversight
- Scoop-Top Targets of Fed HIPAA Enforcers & Simple Steps to Take Control
- HIPAA Changes 2018: How to Comply
- 11th World Pediatric Congress
- 6th International Conference on Big Data, Knowledge Discovery and Data Mining Conference
Last modified: 2018-02-05 15:45:13