Combating Ransomware in Healthcare
William J McBorrough, co-Founder and Chief Security Advisor at MCGlobalTech, a Washington, D.C.-based Information Security Consulting Firm will be presenting this informative webinar. Ransomware attacks have impacted thousands of organizations worldwide. The healthcare sector has been the most targeted. Join for a discussion of the state of ransomware in the healthcare sector in 2021 and best practices to prepare your organization from the inevitable attacks.
Document Retention & Destruction
Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX presents this highly informative webinar. A multitude of laws, including HIPAA, require that certain types of documents be kept for a certain period of time. How does document retention play out for public companies subject to SOX and what should companies do in the event of a legal hold or a preservation request? This presentation addresses laws that are relevant to healthcare industry participants, as well as compliance suggestions, and steps to take when either a legal hold or a preservation request arrives.
Year One of PHE Regulatory Disruption of Reimbursement: Who Adapted, Who is at Risk, Bad Actors
Stephen Bittinger Partner with K&L Gates in the firm’s Charleston office and a member of the health care/FDA practice group, will lead the presentation Year One of PHE Regulatory Disruption of Reimbursement: Who Adapted, Who is at Risk, Bad Actors at the Healthcare Compliance Symposium 2021 on April 22.
Healthcare Cybersecurity Awareness Training
Raymond Ribble, founder of SPHER, Inc. a leading SaaS-based compliance analytics solution addressing PHI protection and cybersecurity in healthcare, leads this informative webinar. This presentation takes the audience through a series of scenarios and lessons learned that can assist in securing the employee "endpoint" either in the office or at a Home Office. The presentation highlights key security measures a person can deploy to create a better security environment in order to protect their personal and professional documents from unauthorized access.