Webinars Rewind (Webinar Archives)
Click on the down arrow in each section to view the related archived webinar
July 13, 2017 Webinar: Protecting from Ransomware Attacks
Tom Leahy, Senior Vice President at Aegify and Joe Harris, Portfolio Executive at Vizient discuss the complex risks and dangers of managing IT Security landscape. Learn how the innovative award winning tool protects healthcare organizations from becoming victims of Ransomware attacks. ...View More.
• Risk and inefficiencies of current monitoring strategies
• Consequences of poor oversight
• How your healthcare organization can establish an efficient system to mitigate risk
• How newer technologies can help maintain a continuous monitoring and mitigation process
May 18, 2017 Webinar:The High Risk Challenges of Third Party Vendor Management
This Webinar recording of the 18th May 2017 on “The High Risk Challenges of Third Party Vendor Management”, helps you learn how to avoid millions of dollars in fines and gain peace of mind through 24/7 monitoring. You will also learn… ...View More.
- Risk and inefficiencies of current monitoring strategies
- Consequences of poor oversight
- How your healthcare organization can establish an efficient system to mitigate risk
- How technology can help automate exception checking across over 48 federal and state databases
Tom Leahy, Senior Vice President at Aegify and Joe Harris, Portfolio Executive at Vizient, discuss the complex risks of third party vendor management. They will walk you through an award winning innovative tool helps protect healthcare organizations by easily managing and maintaining a global view of all vendors, business associates, providers, and employees.
May 10, 2016 Webinar:How to avoid being the next victim of Ransomware attacks- Ten best practices
This archived Webinar addresses understanding Ransomware attacks, recent developments, best practices to avoid becoming the next victim of such attacks, and how Aegify automated solutions will protect you.
Avoiding Healthcare Ransomware Attacks...View More.
The attack that paralyzed MedStar Health’s computer systems in May 2016 was ransomware known as MSIL/Samas. The FBI had issued an alert about March 25, before the MedStar attack began. The main objective in using ransomware is to encrypt and lock up files and databases that contain ePHI in order to charge covered entities and business associates hundreds to thousands of dollars to unlock the data. If within 72 hours the ransom is not paid, then ransomware destroys backups of files and databases that contain electronic patient health information. Hackers and ransomware tools are becoming more sophisticated. This webinar addresses steps to avoid being the next victim of ransomware attacks.
Recent developments paint a scary picture. The ransomware attack is through misleading messages requiring you to pay a fee ranging from $300 to $2000 per computer within 72 hours. Over 66% of all breaches were healthcare targets in 2015 as the healthcare data is 10x more valuable in the market. In 2015, 112 million records were breached of a value greater than $24 million. More than 40% of crypto-locked victims agreed to pay the ransom according to Kent Survey.
This webinar rewind highlights the Ten Best Practices that would help avoiding paying the ransom.
May 26, 2016 Webinar: Detecting and preventing healthcare breaches
Highlighting the biggest security threats of 2015, this webinar archive walks you through effective steps to detect and prevent security breaches.
Detecting & preventing healthcare breaches -2016-05-26...View WebinarApril 26, 2016 Webinar: The biggest danger to healthcare facilities in 2016
If you’re a Covered Entity (CE), you have shared responsibility and liability for the actions of your Business Associates (BAs) and their vendors. You are liable for their actions and omissions. It’s the law, and penalties for lax oversight are steep. Don’t risk facing a tornado of costly penalties, and potential criminal prosecution with little warning. About 30-50% of breaches are due to negligence of the Business associates and Vendors.
The Office of Civil Rights enforcement and audits are ramping up, with increased funding for HIPAA audits. Thousands of Providers and Business associates will be audited in 2016. Recently in Dec 2015, University of Washington Medicine was fined $750K due to lack of oversight of its Business Associates and Vendors.
April 20, 2916 Webinar: Impact of Recent $28.0 Million Settlement on Provider Cyber-security Risk Management
This Webinar archive looks at what happened at St Joseph Health systems that led to a penalty settlement of US$28 million, examining HIPAA requirements related to covered entities and how to avoid such fines.
Impact of Recent $28.0 Million Settlement on Provider - Cyber-security Risk Management -2016-04-20...View WebinarApril 5, 2016 Webinar: Impact of OCR announced $1.55 m settlement on provider BA Management
This archived webinar Discusses the practical impact of a $1.55 m settlement agreed to by North Memorial Health Care of Minnesota to settle potential HIPAA violations. OCR suspected North Memorial of failing to enter into a business associate agreement with a major contractor and failing to institute an organization-wide risk analysis to address the risks and vulnerabilities to its patient information. The size of the settlement means healthcare providers can no longer ignore the risk associated with their business associate and vendor management, including dealing with Business Associate agreements.
Impact of OCR announced $1.55 mm settlement on provider BA Management...View WebinarSept 03, 2016 Webinar: Cyber Security – Learn how to detect and prevent Security breaches
Highlighting the biggest security threats of 2015, this webinar rewind walks you through effective steps to detect and prevent security breaches.
Cyber Security - Learn how to detect and prevent Security breaches - 2015-09-03...View WebinarAugust 13 2015 Webinar: How to deal with HIPAA Business Associates – Vendor Management nightmare?
One of the important changes under the Omnibus rule relates to covered entities’ liability for the conduct of their business associates. The Omnibus rule removed the safe harbor associated with a business associate agreement. A covered entity can now be held liable for the acts or omissions of its business associates that are acting as the covered entity’s “agent,” as determined under the federal common law of agency. This agent liability also extends to a business associate for the actions or omissions of its own subcontractors, if any. Follow a simple 3-step process in managing business associates/vendors recommended in this archived webinar.
How to deal with HIPAA Business Associates - Vendor Management nightmare? -2015-08-13... View WebinarAugust 20 2015 Webinar: Learn how to do HIPAA Omnibus Security Analysis
Assessing an organization’s HIPAA security risk is a very important element of an effective Security strategy. This is an important requirement for Meaningful Use Attestation as well (various stages) and a complex subject. In this webinar we cover all aspects of conducting HIPAA security risk analysis for your business — and how to translate the results into terms that make sense in dollars.
Learn how to do HIPAA Omnibus Security Analysis... View moreThis educational Webinar has been exclusively designed to address the issues and help you understand:
HIPAA Omnibus – summary of changes
Implications of changes for medical providers, business associates and sub-contractors
How to do Meaningful Use Analysis to get federal grants?
How to do HIPAA Security Risk Analysis to meet meaningful use attestation requirements?
Introduction to automated tools for Assessing and Maintaining you HIPAA compliance status and be prepared for an OCR audit.
May 14, 2015 Webinar: Learn how to protect your business from cyber attacks
Just this year a financial firm on Wall Street was hit like no one ever imagined. After being friended on Facebook, 73% of the men in that company gave up highly confidential data – to a 25-year-old woman. But get this, 13% of them gave out their passwords! OUCH! Turns out their CIO had hired a 40-year-old man, acting as a woman – it was a test! What would your end-users do?
Cyber criminals are attacking our businesses right now. Nothing seems to be stopping them. What are they after? Your secrets, innovations, and money. Their methods are stealth. The FBI says it takes about 14 months before companies know they’ve been compromised. The fact is, cybercrime tactics have changed and they are targeting your business.
Every Business Leader Must Understand…Data Theft and Misuse are Not Technical Problems…
But there’s one major mistake companies are making that is making them easy targets. Find out what the one mistake is and see if you really do have it covered. On April 23rd David Stelzl, CISSP and Author of Data@Risk will be sharing with us how new technologies are changing the security landscape and how businesses like yours must respond if you are going to keep your data secure. He’ll also be revealing what that one major mistake is and how to fix it without spending a fortune.
Also this arachived webinar talks about an automated solution to cyber-security harden your organization
Learn how to protect your business from cyber attacks.... View WebinarJune 11, 2015 Webinar: HIPAA Omnibus Rule compliance – How to be ready for an OCR Audit?
The recent HIPAA Omnibus changes, implications of these changes for medical providers, business associates and sub-contractors; HIPAA Assessments and Meaningful Use – Best Practices and Caveats, 9 steps to prepare for an OCR Audit
What to do in case of an OCR Audit? Why you need to maintain your HIPAA compliance and meaningful use status, and how; An introduction to automated tools for assessing and maintaining your HIPAA compliance status, and preparedness for a potential OCR audit.
Sep 3, 2015 Webinar: Cyber-Security Risks – How to assess and manage cyber-security Threats?
Cyber attacks are quite pervasive now, affecting businesses of all sizes from Small and Medium businesses all the way to large Enterprises. This Webinar addresses issues such as the 2014 breach lessons, security threats in 2015, the drivers for security adoption, impact on business due to security attacks, the frequency required to assess security and the need to continuously monitor security. The webinar details the Aegify automated tool for security, risk and compliance management.
Cyber-Security Risks - How to assess and manage cyber-security Threats?... View Webinar