With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization.
We will first look at what are the different types of risk, threats, and vulnerabilities on ePHI and methods to keep your data secure. We will talk though topics such as why spectre and meltdown while not a problem today, could be the cause of the next big
attack. Other attacks such as ransomware, phishing, social engineering, and insider attacks will discussed to help you better understand these threats and what you need to be doing to prevent them. In addition, we will take a brief look at medical device vulnerabilities
and the importance of keeping those devices secure.
Vulnerability management will be discussed and how to use it as a valuable tool to keep your organization protected. If your IT department is not deploying patches and updates to your software and infrastructure it could end up be the cause of a breach or worse a ransomware attack.
Having an incident response plan will be critical to not only have, but to have tested so when you do experience a breach or potential attack you know what to do. In addition, we will look at the importance of having a Disaster Recovery / Business Continuity Plan and how it might be necessary to declare a disaster after an incident. After the webinar, you will have the insight to take your cybersecurity program to the next level.
Why should you Attend: New threats and vulnerabilities appear in the wild daily. Are you prepared if your network becomes infected? Do you understand what your IT department is doing to protect against these attacks? What about understanding the current threats to your organization?
After attending the webinar, you will have a much deeper understanding of why your organization and its data are attack targets and what the malicious individuals are after. With an understanding of the threats, you will be able to plan and prepare so you are ready when you are compromised.
Areas Covered in the Session:
- Risks, threats, and vulnerabilities on ePHI
- The confidentiality, integrity, availability (CIA) triad
- Why you should be afraid of spectre and meltdown
- Ransomware and what to do if infected
- Social engineering and phishing
- Insider attacks
- Medical device vulnerabilities
- Importance of patch management
- Incident Response
- Disaster Recovery / Business Continuity Planning
- Tabletop exercises
Who Will Benefit:
- Health Care Professionals
- Compliance Officers
- Business Associates
- IT Professionals
|10:00 AM — 11:00 AM|
|No. of Days:||1|
• They can get the benefit of advice from experts in the field.
• Healthcare professionals will have the flexibility of viewing recorded webinars at their convenience.
• MentorHealth offers online interactive participation. Using this, healthcare professionals, no matter which part of the world they are based in, will have the opportunity to listen to and interact with some of the most accomplished experts in the healthcare Industry.
MentorHealth is driven by a core objective –that of being a platform for learning and discussion to address some of the important issues and challenges that the healthcare community, consisting of healthcare workers from doctors to nurses to other support staff, is up against in today‘s scenario. Various aspects of healthcare, such as Meaningful Use, Patient Protection and Affordable Care, HIPAA, HITECH Act, Stark and Anti Kickback Act, Valid Consent, Patient Safety and Process Improvement, Patient Safety and Quality Outcomes, Healthcare Information Technology Standards Panel (HITSP), Substance Abuse and Mental Health Records, Nursing Informatics, Healthcare Disclosure, Electronic Transactions Standards such as 5010 and ICD-10, Electronic Health Records, Stimulus Code, Healthcare Information Exchange, Healthcare Information Technology, Medical Necessity, Personal Health Records, Clinical Decision Support, Financial Management and ROI, Electronic Prescribing, Healthcare Information Systems, Clinical Informatics, Insurance Claim Appeals, Auto ID and Bar Coding, Integration and Interoperability, Risk Management in the Retention and Destruction of Medical Records and Medical Records Law, to name just a few, are covered. ...