Bookmark Add to Calendar

Security Risk Analysis for HIPAA Covered Entities and Business Associates

4055
Duration : 60 Minutes

Srini Kolathur,

Srini Kolathur, HITPro, CISSP,CISA, CISM, MBA is a result-driven leader. Srini has several years of experience in helping companies effectively meet and exceed regulatory compliance requirements including SoX, PCI, HIPAA, etc. by using best practices. For the last several years, he has been actively involved in Sarbox control Read more


• Have you identified the e-PHI within your practice? This includes e-PHI that you create, receive, maintain or transmit
• What are the external sources of e-PHI? For example, do vendors or consultants create, receive, maintain or transmit e-PHI?
• What are the human, natural and environmental threats to information systems that contain e-PHI?
• Do you want to attest to EHR incentive program by completing your security risk analysis?

The primary objective of this 60-minute webinar is to help the organization identify the key vulnerabilities in ePHI and EHR systems by reviewing the steps required to complete the security risk analysis and successfully attest to the Meaningful Use (MU) incentive program. In addition, one of the Meaningful Use's core objectives for eligible professionals and hospitals is to conduct a thorough technical risk analysis of EHR and ePHI systems.

Course Objective:

Many health care organizations and their business associates understand they are not meeting the HIPAA compliance requirements for risk analysis and they are concerned this could result in stiff fines and penalties. Do I have to hire an outside security consultant to perform a risk analysis? How can I make sure they focus on the core requirements to protect ePHI and a possible OCR audit, without breaking our budget or requiring an inordinate amount of time? Are there resources available that our team can use that do not require someone with a security background?

We will guide you through the requirements for a HIPAA risk analysis as specified by the OCR, with a clear explanation of each:

• Provide you with a clear method to complete a risk analysis
• Show you practical tools and resources that are freely available to be used by security professionals and HIPAA compliance professionals to complete the risk analysis – even those without a security background
• Identify the top security threats and vulnerabilities to ePHI and what you will need to do to protect your organization in a way that is practical and cost effective

Course Outline:

• A clear understanding of a risk analysis and requirements under HIPAA/HITECH
• How to inventory ePHI, map out systems in scope, identify and prioritize risk
• An easy to follow method to complete a risk analysis
• The most efficient processes to minimize time and maximize effectiveness
• Learn about practical tools and resources for conducting and documenting a risk analysis
• The most common threats and vulnerabilities to ePHI - and cost-effective ways to protect it

What You Get:

• Training Materials
• Live Q&A Session with our Expert
• Participation Certificate
• Access to Signup Community (Optional)
• Reward Points

Who Will Benefit:

• Compliance Director
• Healthcare Compliance Personnel
• Security and Privacy Professional
• Information Systems Manager
• HIPAA Officer
• Chief Information Officer
• Health Information Manager
• Healthcare Counsel/lawyer
• Contracts Manager

Please reach us at 1-888-844-8963 for any further assistance or if you wish to register

100% MONEY BACK GUARANTEED

Refund / Cancellation policy

Get In Touch

Subject : Security Risk Analysis for HIPAA Covered Entities and Business Associates


paypal payment Comodo

Copyright ©2024 Signup Training. All rights reserved.