About admin

This author has not yet filled in any details.
So far has created 134 blog entries.

The IRM|Analysis™ Demo – November 13, 2019 11am–12pm CT

By |October 15th, 2019|

November 13: OCR-Quality Risk Analysis™ Live Demo

Cyber Risk Management: A Business Enabler (Not an IT Issue)

By |September 23rd, 2019|

Cyber risk management is not an “IT problem”; it is an enterprise risk management matter that can be harnessed into a business enabler.

How the New York SHIELD Privacy Bill Impacts Healthcare Organizations

By |September 19th, 2019|

Reporting requirements of New York’s SHIELD Act go into effect on October 23; healthcare organizations that collect or use personal or private data from state residents will need to be in compliance.

NIST Proposes PACS Cybersecurity Guidance for Health Providers

By |September 17th, 2019|

Developed with industry leaders like Clearwater Compliance, Symantec, and others, new NIST guidance and a proposed project could help health delivery organizations secure the PACS ecosystem.

The IRM|Analysis™ Demo – October 30, 2019 11am–12pm CT

By |September 13th, 2019|

October 30: OCR-Quality Risk Analysis™ Live Demo

The State of Cybersecurity | Best Practices for an Enterprise Risk Analysis: Oct 24, 2019 | 11am–12pm CT

By |September 12th, 2019|

October 24: The State of Cybersecurity | Best Practices for an Enterprise Risk Analysis

You are Only as Secure as Your Riskiest Vendor: Oct 22, 2019 | 11am–12pm CT

By |September 12th, 2019|

October 22: You are Only as Secure as Your Riskiest Vendor

What the New York SHIELD Act Means for Healthcare Organizations

By |September 10th, 2019|

On July 25, 2019 the Governor of New York signed into law the “Stop Hacks and Improve Electronic Data Security Act” (SHIELD ACT) effective March 21, 2020.

The Rise of Enterprise Cyber Risk Management Software

By |September 4th, 2019|

The digital transformation of healthcare is rapidly driving the adoption of new technology and information systems to support key business initiatives. We are experiencing a veritable explosion in health care data, systems and devices.

Mitigating the Risks Posed by Malicious Insiders

By |September 4th, 2019|

Every organization should understand their own unique risk profile based on the impact to their organization of a breach, the vulnerabilities that exist within their unique portfolio of information assets and all reasonable threats that might exploit those vulnerabilities including insider threats.

Show Buttons
Hide Buttons