Combating Ransomware in Healthcare

Combating Ransomware in Healthcare

William J McBorrough, co-Founder and Chief Security Advisor at MCGlobalTech, a Washington, D.C.-based Information Security Consulting Firm will be presenting this informative webinar. Ransomware attacks have impacted thousands of organizations worldwide. The healthcare sector has been the most targeted. Join for a discussion of the state of ransomware in the healthcare sector in 2021 and best practices to prepare your organization from the inevitable attacks.
Document Retention and Destruction

Document Retention & Destruction

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX presents this highly informative webinar. A multitude of laws, including HIPAA, require that certain types of documents be kept for a certain period of time. How does document retention play out for public companies subject to SOX and what should companies do in the event of a legal hold or a preservation request? This presentation addresses laws that are relevant to healthcare industry participants, as well as compliance suggestions, and steps to take when either a legal hold or a preservation request arrives.
Risk Management Healthcare

Year One of PHE Regulatory Disruption of Reimbursement: Who Adapted, Who is at Risk, Bad Actors

Stephen Bittinger Partner with K&L Gates in the firm’s Charleston office and a member of the health care/FDA practice group, will lead the presentation Year One of PHE Regulatory Disruption of Reimbursement: Who Adapted, Who is at Risk, Bad Actors at the Healthcare Compliance Symposium 2021 on April 22.
Healthcare Cybersecurity Awareness Training

Healthcare Cybersecurity Awareness Training

Raymond Ribble, founder of SPHER, Inc. a leading SaaS-based compliance analytics solution addressing PHI protection and cybersecurity in healthcare, leads this informative webinar. This presentation takes the audience through a series of scenarios and lessons learned that can assist in securing the employee "endpoint" either in the office or at a Home Office. The presentation highlights key security measures a person can deploy to create a better security environment in order to protect their personal and professional documents from unauthorized access.