Recorded Webinars

 
  • All Categories
  • HIPAA
  • HITRUST
  • NIST
  • Third Party Risk Management

Best Practices to Strengthen your Organization’s Security

Completing an annual HIPAA SRA is an essential component of any healthcare organization’s HIPAA compliance program. However, many organizations fail to take the next steps to remediate those risk items identified in their SRA. By implementing HIPAA remediation measures, organizations can reduce the risk of data breaches and protect the…

Watch Now

Privacy and Right of Access Compliance in 2023

On January 3, 2023 the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced a settlement of $16,500 to resolve a HIPAA violation over a medical record request. This is the 43rd Privacy Right of Access case to be settled in the last 12 months. It…

Watch Now

Top HIPAA Compliance Gaps in 2022

Stuck on your HIPAA Compliance this year? We understand that it can be hard to identify the areas you need to work on to remain compliant. While working with organizations of all sizes across the healthcare industry, we compiled data on the most common gaps in compliance to help organizations…

Watch Now

How to Complete your 2022 HIPAA Security Risk Assessment

Organizations that handle electronic protected health information (ePHI) and participate in programs such as Promoting Interoperability (MACRA/MISP) are required to perform a HIPAA Security Risk Assessment. A risk assessment helps organizations identify areas that post risk to their organization that could leave them susceptible to a breach or ransomware attack…

Watch Now

Security and Privacy Planning: Completing Your HIPAA SRA Before the End of the Year

We are halfway through the year, how are you doing with your HIPAA compliance? Under HIPAA, organizations have the responsibility to safeguard protected health information. This can require a significant investment of time, money, and resources. During our recent webinar we outline simple steps your organization can take to simplify…

Watch Now

Achieving HITRUST Certification: Keys to Success

From scoping to adoption, HITRUST certification can be an arduous process. Our team of HITRUST experts have worked with organizations of all shapes and sizes to help them achieve certification and we have learned a few things along the way. Watch our recent webinar where panelists discussed the top challenges…

Watch Now

A Healthcare Organization’s Journey Through NIST CSF Adoption and Implementation

Watch our panel discussion with Devin Shirley, CISO at Arkansas Blue Cross Blue Shield, as he walked us through his experience in implementing and aligning the various security frameworks, to include the NIST CSF. Devin discussed how he has been able to synchronize his security strategy and operations to successfully…

Watch Now

HIPAA Privacy and Breach Compliance in 2022: Everything You Need to Know

Healthcare organizations that handle ePHI are required to be compliant with HIPAA Privacy and Breach Notification Rules. As the healthcare industry readies for the upcoming amendments to the Privacy and Breach Rules, as well as new state specific privacy requirements, it is important for organizations to prepare for how these…

Watch Now

NIST Adoption for Healthcare

The NIST Cybersecurity Framework (CSF) helps healthcare organizations assess their current security maturity level and take reasonable actions to scale it up. Successfully adopting the NIST CSF often depends on the decisions you make up front and how you manage your adoption lifecycle. Properly scoping the assessment and setting appropriate…

Watch Now

What You Need To Know About HIPAA Security and Privacy Compliance in 2022

Many organizations use time-consuming and inaccurate manual processes for compliance, such as complicated spreadsheets and uninspired templates. By completing a HIPAA Security Risk Assessment (SRA) that follows an approved framework, organizations can more readily address risks and vulnerabilities that can leave an organization susceptible to a data breach, resulting in compromised health…

Watch Now

Improve your Security and Compliance posture through annual planning

It is time to start planning your 2022 security program roadmap. Security and privacy challenges are continuing to evolve which means your 2022 roadmap needs to keep up to meet compliance requirements, reduce your risks and strengthen your overall security posture. Managing all your disparate security program activities is no…

Watch Now

i1 vs r2 – How the New HITRUST Offerings Can Benefit You

In late 2021, HITRUST announced changes to their assessment portfolio, providing additional options for HITRUST certification to organizations of all types, sizes and maturity. Are you wondering what these changes mean? Wondering which level of certification is right for you? Have questions about HITRUST in general? Watch the recording of…

Watch Now

Don’t wait to complete your HIPAA Security Risk Assessment before the end of the year

Waiting until the end of the year to complete your HIPAA Security Risk Analysis can cause unnecessary stress. Listen to our recent webinar as we discuss how to utilize Intraprise Health’s HIPAA One® software to guide you through the security risk assessment process, simplify and automate your compliance, and eliminate…

Watch Now

Completing your HIPAA Security Risk Assessment before the end of 2021

Organizations that handle protected health information and participate in programs such as MIPS are required to perform a HIPAA Security Risk Assessment on an annual basis to fulfill their obligations to PHI security and privacy. Managing compliance can be messy and tedious – especially if you are using spreadsheets and…

Watch Now

Framework Soup – Understand the difference between Risk Management Frameworks, Control Frameworks and Reporting Frameworks

In this webinar, HITRUST’s Mike Parisi and Intraprise Health’s Ryan Patrick discuss security frameworks and how to determine which one is right for your organization. Listeners of this webinar will: • Learn about the benefits and shortcomings of each of these frameworks • Hear examples of use cases of when…

Watch Now

Vendor Assessments: Where are the Clear Areas of Risk?

Data breaches caused by third party vendors have risen steadily over the last several years and costs associated with those breaches have skyrocketed. What do these breaches have in common and what can healthcare organizations do to better protect themselves? Intraprise Health has combed through hundreds of third-party assessments to…

Watch Now

What You Need to Know About HIPAA Security and Privacy Compliance in 2021

HIPAA compliance and data security are more important than ever for organizations housing protected health information, but understanding what is required can be confusing. We are here to help! During this webinar, we outline simple steps that your organization can take to achieve compliance. Session key take-a-ways include: Updates to…

Watch Now

Questions About HITRUST Certification

Learn from our HITRUST experts as they answer your questions on how to attain HITRUST certification. The Value of HITRUST Introduction to the HITRUST CSF Assessment Phases Evaluation Criteria and Scoring Questions to ask when looking for an Assessor How to get the most out of your HITRUST engagement By…

Watch Now

HIPAA Compliance Management for Hospitals

HIPAA compliance and data security are more important than ever for hospitals and health systems. Healthcare organizations must regularly perform a Security Risk Analysis (SRA) to maintain HIPAA compliance and fulfill their obligations to PHI security and privacy. Managing compliance can be a messy, tedious task – especially if you…

Watch Now

The TPRM Paradigm Shift: What You Need To Know

Managing third-party (“vendor”) risk in a holistic manner is a top priority for all organizations. Recent reporting highlights how malicious actors are targeting healthcare data and security weaknesses across the entire supply chain including the third parties that host data for their customers on cloud and hosted platforms. The reality…

Watch Now

Improve Your Security Posture with a HIPAA Security Risk Assessment (SRA)

Performing an SRA is a requirement under the HIPAA Security rule as well as leading risk management frameworks such as HITRUST and NIST. It’s also the key requirement in OCR’s HIPAA Audit Protocol. An annual HIPAA Security Risk Assessment is your opportunity to pause and focus on enhancing the overall…

Watch Now

Understanding HITRUST Scoping: Tips from an Experienced HITRUST Assessor

Scoping may well be the most critical phase of your HITRUST Certification process. During this phase you must identify the number of control requirements your organization needs to comply with in order to become HITRUST certified. The larger your Scope, the more complex your Assessment. Understanding the Scoping process helps…

Watch Now

Focused Security Risk Assessments – Remote Work in the age of COVID-19

Focusing and Improving Your Security Risk Assessment  A basic yet critical practice for healthcare organizations is to perform a security risk assessment, at least annually, and whenever there is significant change in the environment – such as large scale remote work.  Understand the security implications of remote work at this current…

Watch Now

HITRUST Essentials – Catapult Health’s Journey to HITRUST Certification

Catapult Health’s Journey to HITRUST Certification Working with Intraprise Health, Catapult’s journey to certification took about one year—faster than many organizations. During this webinar, Joe Bell, Catapult Health’s VP of Technology discusses what he learned along the way to HITRUST certification, how it has impacted his organization and how it will…

Watch Now

Performing an Annual Security Risk Assessment

What You Need to Know About Your HIPAA SRA   Listen as our security experts discuss: The requirements for performing a HIPAA SRA under Federal and State law Regulations and guidance from HHS, OCR and other agencies? How often do you have to perform an SRA? What if you are…

Watch Now

Third-Party Risk Management: The essential elements of a strong program

Listen as our panel of cybersecurity experts share the elements of a strong third-party risk management program. Gain a better understanding of: What type of companies need TPRM and why How to determine the potential risk a vendor brings to your organization The key elements of assessing vendors and risk…

Watch Now

Scaling Third-Party and Enterprise Risk Management

Listen as our panel of experts, including Valley Health’s CISO share information on building a strong security program. The panel discusses: Trends behind the focus on TPRM How Valley Health is approaching TPRM Keys to a scalable TPRM program Current solutions and emerging software platforms How CISO’s can foster adoption…

Watch Now

HITRUST Essentials

Listen as Michael Parisi from HITRUST joins Intraprise Health and discusses: The benefits of HITRUST certification What you should know as you begin your HITRUST journey What types of information will be evaluated How your Assessment will be scored How you can best prepare for a HITRUST Assessment

Watch Now