This HIPAA risk analysis webinar will help you to understand the components needed to conduct a comprehensive security, risk analysis for your organization, in order to comply with the HIPAA standards and the far reaching affects of the HITECH Act. You will learn how to identify sources of PHI and ePHI in your organization, external sources and the threats to information system that contain PHI and ePHI.
When assessing the risks and vulnerabilities associated with PHI and ePHI, there are three key questions health care organizations should ask, before performing a risk analysis.
Can you identify the sources of PHI and ePHI within your organization, including all PHI that you create, receive, maintain or transmit?
What are the external sources of PHI/ePHI?
What are the human, natural, and environmental threats to information systems that contain PHI and ePHI?
This webinar will not only address answering the above referenced questions, but moreover, this discussion will allow you to put these questions/answers in perspective to address your internal and external security needs and devise the most comprehensive plan for your organization's demands.
System Characterization;
Threat Identification;
Vulnerability Identification;
Control Analysis;
Likelihood Determination;
Impact Analysis;
Risk Determination;
Why Should You Attend:
This webinar will help you analyze and understand the two very specific HIPAA-security compliance assessments. You will be able to develop organizational compliance plans that address both privacy and security within your organization, specifically addressing your ability to secure patient information within your company, in both physical and electronic forums.When assessing the risks and vulnerabilities associated with PHI and ePHI, there are three key questions health care organizations should ask, before performing a risk analysis.
Can you identify the sources of PHI and ePHI within your organization, including all PHI that you create, receive, maintain or transmit?
What are the external sources of PHI/ePHI?
What are the human, natural, and environmental threats to information systems that contain PHI and ePHI?
This webinar will not only address answering the above referenced questions, but moreover, this discussion will allow you to put these questions/answers in perspective to address your internal and external security needs and devise the most comprehensive plan for your organization's demands.
Areas Covered in the Webinar:
This discussion will provide valuable insight and application to a practical and systematic process to initiate and evaluate your organization’s security practices. Within the hour, we will define how to apply a specific methodology, during a risk assessment and to establish a comprehensive analysis:System Characterization;
Threat Identification;
Vulnerability Identification;
Control Analysis;
Likelihood Determination;
Impact Analysis;
Risk Determination;
- Control Recommendations; and
- Results Documentation.
- Understanding these categories will help you look at the depth of your criticalities and define each vulnerability in terms that will afford your company with an action plan to cure the problem and put in place procedures to lessen and/or alleviate the risk.
Who Will Benefit:
This webinar will be most beneficial to those person’s directly, impactfully involved with the security and protection of patient health records: Any personnel that has the responsibility of protecting and securing patient information, whether electronically and/or physically, will benefit from attending this webinar.- CIO’s
- HIPAA Privacy Professionals
- Risk Management Professions
- Compliance Officers/Professionals
- IT/IS
- Clinical Trial Professionals
- Physicians and Nurses
- Hospital Admin and Documentation
Course Provider
Coy Murchison,