+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Healthcare, Cybersecurity, and HIPAA - New Threats and New Guidance - Webinar

  • ID: 4899755
  • Webinar
  • February 2018
  • Region: Global
  • 90 Minutes
  • Compliance Online
1 of 2
Why Should You Attend:

Cybersecurity has become one of the key issues for healthcare as malicious actors seek to interfere with healthcare delivery systems by locking up and/or destroying data and even physical systems, or even denying Internet access to broad areas of the country. The threats have only begun and promise to become more serious and more damaging. Cybersecurity threats are high impact, high likelihood events of the highest risk level.

In this session, we will examine how following the requirements of the HIPAA Security Rule and specifically taking into consideration cyber-threats can help a healthcare entity prepare itself to defend against cyber-attacks and the significant impacts to privacy, security, and patient care and safety that can result. You will learn about the latest guidance and tools for assisting in preparation and response to cyber-attacks, and what to do if the attack is successful and creates an incident that must be managed and recovered from.
We will discuss the NIST Cybersecurity Framework and its five steps to deal with Cyber-risk: Identify the assets you wish to protect, Protect those assets, Detect any threats to the assets, Respond to the threats, and then Recover from the event. The four tiers of implementation will be described, and the steps in establishing a Cybersecurity program will be explained.
Areas Covered in the Webinar:

How the HIPAA Security Rule addresses Cybersecurity, and how to use the rule to prevent cyber-attacks
How Cybersecurity is different from other kinds of security issues and why it deserves special attention
The NIST Cybersecurity Framework and how to use it to prepare for and respond to Cybersecurity events
New initiatives by HHS to provide resources and information to assist during a wave of cyber-attacks
The importance of regular, repeated training to help prevent the initiation of an attack on your systems
How to respond to and follow up on an attack that may result in a breach of information
Recommendations for preventing and responding to Cybersecurity attacks involving Ransomware
Note: Product cover images may vary from those shown
2 of 2
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a variety of health care providers, businesses, universities, small and large hospitals, urban and rural mental health and social service agencies, health insurance plans, and health care business associates. He serves on the HIMSS Information Systems Security Workgroup, has co-chaired the Electronic Data Interchange Privacy and Security Workgroup, currently serves on the WEDI Breach Notification sub-workgroup, and is a recipient of the 2011 WEDI Award of Merit. He is a frequent speaker regarding HIPAA and information privacy and security compliance issues at seminars and conferences, including speaking engagements at AHIMA national and regional conventions and WEDI national conferences, and before regional HFMA chapter meetings and state hospital associations.

Mr. Sheldon-Dean has nearly 30 years of experience in policy analysis and implementation, business process analysis, information systems and software development. His experience includes leading the development of health care related websites; award-winning, best-selling commercial utility software; and mission-critical, fault-tolerant communications satellite control systems. In addition, he has eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Mr. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master's degree from the Massachusetts Institute of Technology.
Note: Product cover images may vary from those shown