Our live web events provide valuable information on a range of HIPAA compliance and cyber risk management related topics and allow attendees to gain insider insight and learn industry best practices. Check back frequently as new webinar topics and dates are always being added!

I just wanted to let you know that your webinar today was one of the best that that I have ever attended.
Dan Landsberg, Senior IT Auditor
Bob, I wanted you to know today’s presentation was outstanding. It’s great to be a client of Clearwater!
Ed O'Mara, President, Innovative Care Management

December

OCR enforcement actions clearly indicate the standard by which risk analyses will be evaluated during an OCR audit, investigation or compliance review:
1. the HIPAA Risk Analysis implementation specification language at 45 CFR 164.308(a)(1)(ii)(A) of the HIPAA Security Rule;
2. the methodology outlined in the HHS/OCR “Guidance on Risk Analysis Requirements under the HIPAA Security Rule”; and,
3. the underlying NIST Special Publications for performing a risk assessment, specifically NIST SP 800-30 “Guide for Conducting Risk Assessments”. More>

Learning Objectives:

  • Ultimately, make higher quality decisions about information / cyber risks by adopting the NIST approach
  • Implement the NIST IRM Process: Framing, Assessing, Responding to and Monitoring Risk
  • Leverage the NIST Cybersecurity Framework to better manage and reduce cybersecurity risk
  • Mature your IRM program to proactively protect your organization’s sensitive information

This webinar is designed for anyone responsible for protecting sensitive personal information. Business leaders, managers and professionals with responsibility for privacy, security, compliance or risk management should attend. CEOs, COOs, CFOs, Chief Compliance Officers, Chief Risk Officers, Chief Privacy Officers, Chief Security Officers, and Chief Information Officers should also attend given the increased scrutiny under which shareholders and other stakeholders are placing these executives.

More Info

Clearwater fully supports and recommends adoption of the National Institute of Standards and Technology’s (NIST) approach standards for managing information risk. Clearwater’s Cyber Risk Services™ (CRS™) is a 3-year effort that harnesses the power of NIST and assist organizations to establish, implement and mature their compliance and cyber risk management program.

More Info
Get a closer look at our IRM|Analysis™ Software!

More Info

End the confusion; avoid being hoodwinked! Avoid rescinding your Meaningful Use Attestation because you failed to complete a bona fide risk analysis or security assessment. We’ll explain the critical difference.

No matter where you are in your HIPAA-HITECH compliance journey, you will benefit from learning about:

• The requirements of the HIPAA Security Final Rule for evaluations
• The difference between a compliance evaluation and a risk assessment
• What is needed to meet the Meaningful Use Security objective
• Proven approaches to completing these evaluations
• Step-by-Step Guidance for completing compliance assessments and risk assessments
• Available software and tools to jump-start your evaluation processes and overall compliance program.

More Info

January

Clearwater’s newest, cutting-edge educational series, OCR-Quality Risk Analysis Working Lab™ is designed to remove the guesswork out of OCR’s risk analysis criteria for ensuring cyber risk exposures are minimized.

More Info

February

With increasing penalties, greater enforcement and a growing set of sources of business risks and liabilities, healthcare organizations and companies that support healthcare organizations must gain a solid understanding of the HIPAA Privacy and Security and  Breach Notification Rules.

While it is fairly well known that these rules provide for the privacy and security of Protected Health Information (PHI), the details of the laws: who is covered, what is covered, what is required, etc., is not well understood by either healthcare providers, their business associates or subcontractors.
Our goal is to help make it all clearer. More>

Although most healthcare covered entities think they’ve got their act totally together when it comes to the HIPAA Privacy Rule, preliminary OCR observations from the first proactive audits highlighted serious weaknesses in privacy training, safeguards, policies & procedures, sanctions, training and mitigation. This live web event will give you a clear path to preparing for those Phase 2 Audits.More>
No matter what industry you are in today, it is a commonplace regulatory requirement and industry best practice to conduct a security risk assessment. In fact, completing such an assessment, regulations aside, is the foundation of any good information security program. Even if you are among the small percentage of organizations that are not required by regulations to conduct a risk assessment, it should be a standard, ongoing key step in your organization’s risk management strategy and plan. More>
What would a data breach cost your organization? Attend this 75-minute live webinar and learn from industry experts how to assess specific security risks and build a strong business case for enhanced security. You’ll learn about a 5-step method to estimate the overall potential costs of a data breach specific to your organization. This method was developed in conjunction with the American National Standards Institute (ANSI). More>

March

Clearwater’s cutting edge, educational series is back with 2 new sessions focusing on HIPAA Security Risk Assessments. More information to come!

End the confusion; avoid being hoodwinked! Avoid rescinding your Meaningful Use Attestation because you failed to complete a bona fide risk analysis or security assessment. We’ll explain the critical difference.

No matter where you are in your HIPAA compliance journey, you will benefit from learning about:

• The requirements of the HIPAA Security Final Rule for evaluations
• The difference between a compliance evaluation and a risk assessment
• What is needed to meet the Meaningful Use Security objective
• Proven approaches to completing these evaluations
• Step-by-Step Guidance for completing compliance assessments and risk assessments
• Available software and tools to jump-start your evaluation processes and overall compliance program.

More Info