Recorded Webinars
- All Categories
- HIPAA
- HITRUST
- NIST
- Third Party Risk Management
A Roadmap to Improved Security Posture for Healthcare Executives
Healthcare cybersecurity is more complex – and urgent – than ever. Access our recorded webinar now to hear from industry experts as they discuss how to develop an actionable plan to fortify your healthcare organization’s defenses against internal and external threats.
Best Practices to Strengthen your Organization’s Security
Completing an annual HIPAA SRA is an essential component of any healthcare organization’s HIPAA compliance program. However, many organizations fail to take the next steps to remediate those risk items identified in their SRA. By implementing HIPAA remediation measures, organizations can reduce the risk of data breaches and protect the…
Privacy and Right of Access Compliance in 2023
On January 3, 2023 the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced a settlement of $16,500 to resolve a HIPAA violation over a medical record request. This is the 43rd Privacy Right of Access case to be settled in the last 12 months. It…
Top HIPAA Compliance Gaps in 2022
Stuck on your HIPAA Compliance this year? We understand that it can be hard to identify the areas you need to work on to remain compliant. While working with organizations of all sizes across the healthcare industry, we compiled data on the most common gaps in compliance to help organizations…
How to Complete your 2022 HIPAA Security Risk Assessment
Organizations that handle electronic protected health information (ePHI) and participate in programs such as Promoting Interoperability (MACRA/MISP) are required to perform a HIPAA Security Risk Assessment. A risk assessment helps organizations identify areas that post risk to their organization that could leave them susceptible to a breach or ransomware attack…
Security and Privacy Planning: Completing Your HIPAA SRA Before the End of the Year
We are halfway through the year, how are you doing with your HIPAA compliance? Under HIPAA, organizations have the responsibility to safeguard protected health information. This can require a significant investment of time, money, and resources. During our recent webinar we outline simple steps your organization can take to simplify…
Achieving HITRUST Certification: Keys to Success
From scoping to adoption, HITRUST certification can be an arduous process. Our team of HITRUST experts have worked with organizations of all shapes and sizes to help them achieve certification and we have learned a few things along the way. Watch our recent webinar where panelists discussed the top challenges…
A Healthcare Organization’s Journey Through NIST CSF Adoption and Implementation
Watch our panel discussion with Devin Shirley, CISO at Arkansas Blue Cross Blue Shield, as he walked us through his experience in implementing and aligning the various security frameworks, to include the NIST CSF. Devin discussed how he has been able to synchronize his security strategy and operations to successfully…
HIPAA Privacy and Breach Compliance in 2022: Everything You Need to Know
Healthcare organizations that handle ePHI are required to be compliant with HIPAA Privacy and Breach Notification Rules. As the healthcare industry readies for the upcoming amendments to the Privacy and Breach Rules, as well as new state specific privacy requirements, it is important for organizations to prepare for how these…
NIST Adoption for Healthcare
The NIST Cybersecurity Framework (CSF) helps healthcare organizations assess their current security maturity level and take reasonable actions to scale it up. Successfully adopting the NIST CSF often depends on the decisions you make up front and how you manage your adoption lifecycle. Properly scoping the assessment and setting appropriate…
What You Need To Know About HIPAA Security and Privacy Compliance in 2022
Many organizations use time-consuming and inaccurate manual processes for compliance, such as complicated spreadsheets and uninspired templates. By completing a HIPAA Security Risk Assessment (SRA) that follows an approved framework, organizations can more readily address risks and vulnerabilities that can leave an organization susceptible to a data breach, resulting in compromised health…
Improve your Security and Compliance posture through annual planning
It is time to start planning your 2022 security program roadmap. Security and privacy challenges are continuing to evolve which means your 2022 roadmap needs to keep up to meet compliance requirements, reduce your risks and strengthen your overall security posture. Managing all your disparate security program activities is no…
i1 vs r2 – How the New HITRUST Offerings Can Benefit You
In late 2021, HITRUST announced changes to their assessment portfolio, providing additional options for HITRUST certification to organizations of all types, sizes and maturity. Are you wondering what these changes mean? Wondering which level of certification is right for you? Have questions about HITRUST in general? Watch the recording of…
Don’t wait to complete your HIPAA Security Risk Assessment before the end of the year
Waiting until the end of the year to complete your HIPAA Security Risk Analysis can cause unnecessary stress. Listen to our recent webinar as we discuss how to utilize Intraprise Health’s HIPAA One® software to guide you through the security risk assessment process, simplify and automate your compliance, and eliminate…
Completing your HIPAA Security Risk Assessment before the end of 2021
Organizations that handle protected health information and participate in programs such as MIPS are required to perform a HIPAA Security Risk Assessment on an annual basis to fulfill their obligations to PHI security and privacy. Managing compliance can be messy and tedious – especially if you are using spreadsheets and…
Framework Soup – Understand the difference between Risk Management Frameworks, Control Frameworks and Reporting Frameworks
In this webinar, HITRUST’s Mike Parisi and Intraprise Health’s Ryan Patrick discuss security frameworks and how to determine which one is right for your organization. Listeners of this webinar will: • Learn about the benefits and shortcomings of each of these frameworks • Hear examples of use cases of when…
Vendor Assessments: Where are the Clear Areas of Risk?
Data breaches caused by third party vendors have risen steadily over the last several years and costs associated with those breaches have skyrocketed. What do these breaches have in common and what can healthcare organizations do to better protect themselves? Intraprise Health has combed through hundreds of third-party assessments to…
What You Need to Know About HIPAA Security and Privacy Compliance in 2021
HIPAA compliance and data security are more important than ever for organizations housing protected health information, but understanding what is required can be confusing. We are here to help! During this webinar, we outline simple steps that your organization can take to achieve compliance. Session key take-a-ways include: Updates to…
Questions About HITRUST Certification
Learn from our HITRUST experts as they answer your questions on how to attain HITRUST certification. The Value of HITRUST Introduction to the HITRUST CSF Assessment Phases Evaluation Criteria and Scoring Questions to ask when looking for an Assessor How to get the most out of your HITRUST engagement By…
HIPAA Compliance Management for Hospitals
HIPAA compliance and data security are more important than ever for hospitals and health systems. Healthcare organizations must regularly perform a Security Risk Analysis (SRA) to maintain HIPAA compliance and fulfill their obligations to PHI security and privacy. Managing compliance can be a messy, tedious task – especially if you…
The TPRM Paradigm Shift: What You Need To Know
Managing third-party (“vendor”) risk in a holistic manner is a top priority for all organizations. Recent reporting highlights how malicious actors are targeting healthcare data and security weaknesses across the entire supply chain including the third parties that host data for their customers on cloud and hosted platforms. The reality…
Improve Your Security Posture with a HIPAA Security Risk Assessment (SRA)
Performing an SRA is a requirement under the HIPAA Security rule as well as leading risk management frameworks such as HITRUST and NIST. It’s also the key requirement in OCR’s HIPAA Audit Protocol. An annual HIPAA Security Risk Assessment is your opportunity to pause and focus on enhancing the overall…
Understanding HITRUST Scoping: Tips from an Experienced HITRUST Assessor
Scoping may well be the most critical phase of your HITRUST Certification process. During this phase you must identify the number of control requirements your organization needs to comply with in order to become HITRUST certified. The larger your Scope, the more complex your Assessment. Understanding the Scoping process helps…
Focused Security Risk Assessments – Remote Work in the age of COVID-19
Focusing and Improving Your Security Risk Assessment A basic yet critical practice for healthcare organizations is to perform a security risk assessment, at least annually, and whenever there is significant change in the environment – such as large scale remote work. Understand the security implications of remote work at this current…
HITRUST Essentials – Catapult Health’s Journey to HITRUST Certification
Catapult Health’s Journey to HITRUST Certification Working with Intraprise Health, Catapult’s journey to certification took about one year—faster than many organizations. During this webinar, Joe Bell, Catapult Health’s VP of Technology discusses what he learned along the way to HITRUST certification, how it has impacted his organization and how it will…
Performing an Annual Security Risk Assessment
What You Need to Know About Your HIPAA SRA Listen as our security experts discuss: The requirements for performing a HIPAA SRA under Federal and State law Regulations and guidance from HHS, OCR and other agencies? How often do you have to perform an SRA? What if you are…
Third-Party Risk Management: The essential elements of a strong program
Listen as our panel of cybersecurity experts share the elements of a strong third-party risk management program. Gain a better understanding of: What type of companies need TPRM and why How to determine the potential risk a vendor brings to your organization The key elements of assessing vendors and risk…
Scaling Third-Party and Enterprise Risk Management
Listen as our panel of experts, including Valley Health’s CISO share information on building a strong security program. The panel discusses: Trends behind the focus on TPRM How Valley Health is approaching TPRM Keys to a scalable TPRM program Current solutions and emerging software platforms How CISO’s can foster adoption…
HITRUST Essentials
Listen as Michael Parisi from HITRUST joins Intraprise Health and discusses: The benefits of HITRUST certification What you should know as you begin your HITRUST journey What types of information will be evaluated How your Assessment will be scored How you can best prepare for a HITRUST Assessment