New Search

If you are not happy with the results below please do another search

96 search results for: cybersecurity

41

Combatting Ransomware in Healthcare

1st Talk Compliance features guest William J McBorrough, co-Founder and Chief Security Advisor at MCGlobalTech, a D.C.-based Information Security Consulting Firm on the topic of “Combatting Ransomware in Healthcare.” William joins our host, Catherine Short to examine how ransomware attacks have impacted thousands of organizations worldwide with the healthcare sector having been the most targeted. Join us in a discussion of the state of ransomware in the healthcare sector and best practices to prepare your organization from the inevitable attacks.

42

How to Prevent Employee Snooping and Insider Threats – Audio Version of the Webinar

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

43

How to Prevent Employee Snooping and Insider Threats

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

45

Appreciating Extreme Risk Protection Orders and HIPAA

Rachel V. Rose, JD, MBA is a Principal with Rachel V. Rose – Attorney at Law, P.L.L.C. (Houston, TX), a frequent guest on our podcast, 1st Talk Compliance and she will lead the presentation Appreciating Extreme Risk Protection Orders and HIPAA at the upcoming Virtual Healthcare Compliance Symposium 2022 on April 28. Join us to earn CEUs and CLE from the comfort of your home or office.

46

Healthcare and Technology Negotiations

Catherine Short converses with Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX and Bruce J. Lynskey, Co-Founder at ePrevenir, on the topic of “Negotiations in Healthcare and Technology.” Negotiating occurs in every facet of business and law. From contractual negotiations through settlement negotiations, it is a delicate dance. There are a variety of classic negotiation techniques, which include extreme posturing and “anchoring”. Healthcare and cybersecurity present unique challenges because of the looming exposure to a government investigation and either a civil and/or criminal action, even if a settlement is reached between two private parties. Here we will discuss approaches when negotiating contracts, settlements, and other items, which arise in healthcare and the cybersecurity industries.

47

Hardware Hacking in Healthcare: Expert Insights

The healthcare industry and hospitals are increasingly at risk for ransomware and other types of cyberattacks. Several recent examples illustrate the risks and repercussions that result from a combination of inadequate resources and a lack of clear and effective cybersecurity guidelines.

48

Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar

John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, “the Insecurity of Everything” will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected!

49

Hardware Hacking Trends – The Insecurity of Everything

John Shegerian of ERI and co-author of the cybersecurity book, “the Insecurity of Everything” will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected!

50

Negotiations in Healthcare and Technology

Rachel V. Rose, JD, MBA, principal with Rachel V. Rose – Attorney at Law, P.L.L.C., Houston, TX and Bruce Lynskey, Co-Founder, Director, and Chief Executive Officer at ePrevenir will be presenting with us. Negotiating occurs in every facet of business and law. From contractual negotiations through settlement negotiations, it is a delicate dance. There are a variety of classic negotiation techniques, which include extreme posturing and “anchoring”. Healthcare and cybersecurity present unique challenges because of the looming exposure to a government investigation and either a civil and/or criminal action, even if a settlement is reached between two private parties. The purpose of this presentation is to provide approaches when negotiating contracts, settlements, and other items, which arise in healthcare and the cybersecurity industries.