Recorded Webinars
Surviving a Security Audit: Utilizing the OCR Protocols to Conduct a Mock Survey
The OCR HIPAA Audit program analyzes processes, controls, and policies of selected covered entities pursuant to the HITECH Act audit mandate. OCR established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits. The entire audit protocol is organized around modules, representing separate elements of privacy, security, and breach notification. The combination of these multiple requirements may vary based on the type of covered entity selected for review.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Creating and Implementing Effective Security Policies
Before creating effective security policies and procedures it is important for organizations to understand the significant differences in these two terms. This presentation will explain why you need policies, the key steps to creating effective policies, whom to involve, and the characteristics of an effective policy.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
HIPAA Security 101: Revisiting the Rule and How it Applies to the Challenges of Today
This session will walk the users through each of the HIPAA standards of Administrative, Physical, Technical and Organizational and provide insight that will be helpful in evaluating the current practices at an organization. It will start with a process to determine if an organization is HIPAA compliant and discuss what HIPAA compliance actually means.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Surviving a Security Audit: Utilizing the OCR Protocols to Conduct a Mock Survey
The OCR HIPAA Audit program analyzes processes, controls, and policies of selected covered entities pursuant to the HITECH Act audit mandate. OCR established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits. The entire audit protocol is organized around modules, representing separate elements of privacy, security, and breach notification. The combination of these multiple requirements may vary based on the type of covered entity selected for review.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Risk Analysis to Meet HIPAA, HITECH, and Meaningful Use
This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
HIPAA Security 101: Revisiting the Rule and How it Applies to the Challenges of Today
This session will walk the users through each of the HIPAA standards of Administrative, Physical, Technical and Organizational and provide insight that will be helpful in evaluating the current practices at an organization. It will start with a process to determine if an organization is HIPAA compliant and discuss what HIPAA compliance actually means.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
HIPAA Compliance and Business Associates: Managing the Business Associates Relationship 'Safely'
This session will cover the intricate relationship between the patient, the covered entity and business associates. This will include processes to identify the business associate, the process to qualify a business associate, key ways to exchange information and why you should encourage the business associates to sign your business associate agreement. This session will include SOC 1 and SSAE 16 documents as well as providing the key questions that you should ask every business associate.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Risk Analysis to Meet Meaningful Use and HIPAA-HITECH
This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Creating and Implementing Effective Security Policies
Before creating effective security policies and procedures it is important for organizations to understand the significant differences in these two terms. This presentation will explain why you need policies, the key steps to creating effective policies, whom to involve, and the characteristics of an effective policy.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Application Security: How to Prioritize, Evaluate and Strengthen Controls
The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This session will focus on methods to identify, prioritize, evaluate and strengthen controls within systems. In this session we will review tools and processes that allow organizations to quickly, but effectively review these systems.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Surviving a Security Audit: Utilizing the OCR Protocols to conduct a Mock Survey
In this presentation we will discuss the objectives of the HIPAA/HITECH Security Audit, How to accomplish this Audit, How to report within the organization, the fines and penalties that could occur, what steps you can take to document your compliance and the roles and responsibilities within your organization.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details
Risk Management to Meet Meaningful Use and HIPAA-HITECH
This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.
- William Miaoulis
- Recorded
- Price: ¤225.00
- View Details