Our live web events provide valuable information on a range of HIPAA compliance and cyber risk management related topics and allow attendees to gain insider insight and learn industry best practices. Check back frequently as new webinar topics and dates are always being added!

I just wanted to let you know that your webinar today was one of the best that that I have ever attended.
Dan Landsberg, Senior IT Auditor
Bob, I wanted you to know today’s presentation was outstanding. It’s great to be a client of Clearwater!
Ed O'Mara, President, Innovative Care Management

January

Clearwater’s newest, cutting-edge educational series, OCR-Quality Risk Analysis Working Lab™ is designed to remove the guesswork out of OCR’s risk analysis criteria for ensuring cyber risk exposures are minimized.

More Info

February

With increasing penalties, greater enforcement and a growing set of sources of business risks and liabilities, healthcare organizations and companies that support healthcare organizations must gain a solid understanding of the HIPAA Privacy and Security and  Breach Notification Rules.

While it is fairly well known that these rules provide for the privacy and security of Protected Health Information (PHI), the details of the laws: who is covered, what is covered, what is required, etc., is not well understood by either healthcare providers, their business associates or subcontractors.
Our goal is to help make it all clearer. More>

Although most healthcare covered entities think they’ve got their act totally together when it comes to the HIPAA Privacy Rule, preliminary OCR observations from the first proactive audits highlighted serious weaknesses in privacy training, safeguards, policies & procedures, sanctions, training and mitigation. This live web event will give you a clear path to preparing for those Phase 2 Audits.More>
No matter what industry you are in today, it is a commonplace regulatory requirement and industry best practice to conduct a security risk assessment. In fact, completing such an assessment, regulations aside, is the foundation of any good information security program. Even if you are among the small percentage of organizations that are not required by regulations to conduct a risk assessment, it should be a standard, ongoing key step in your organization’s risk management strategy and plan. More>
You have undoubtedly heard the term “cloud computing” applied to a wide range of technologies, and used to describe any number of very different products. Most people accept this term, while secretly wondering “what is the cloud?” and “where is it located?”. Since data security and privacy are of utmost importance to healthcare organizations, and HIPAA regulations mandate certain “reasonable and appropriate” controls to be implemented for data protection, many wonder if cloud computing solutions can truly meet the requirements of HIPAA and provide the same data protection as traditional on-premise computing systems. In this session, we’ll define cloud computing and discuss the options and possibilities for taking advantage of the flexibility and scalability of cloud services while maintaining a careful control on data security, privacy, and availability. More>

March

Clearwater’s cutting edge, educational series is back with 2 new sessions focusing on HIPAA Security Risk Assessments. More information to come!

Many organizations struggle to understand the difference between the HIPAA Security Evaluation required at 45 CFR §164.308(a)(8) and the HIPAA Security Risk Analysis required at 45 CFR §164.308(a)(1).  The HIPAA Security Rule requires both assessments.

Register today and end the confusion.   More>

April

Employees post the biggest threat to your organization’s sensitive data. It does not take malicious intent to cause harm, and most employees are simply not aware how their practices lead to data leakage.  Although most don’t think of HR when talking about HIPAA, there are many areas in which HR can reduce the risk of a data breach and increase compliance.

Attend this 75-minute webinar and learn how HR and HIPAA intersect.  More>

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is one of three sections in the NIST IRM approach. The NIST CSF is voluntary guidance, consisting of standards, guidelines, and practices to promote the protection of critical infrastructure, while creating a common language for cybersecurity.

Join this webinar and leverage a key ingredient for a successful information / cyber risk management program.  More>

With increasing penalties, greater enforcement and a growing set of sources of business risks and liabilities, healthcare organizations and companies that support healthcare organizations must gain a solid understanding of the HIPAA Privacy and Security and  Breach Notification Rules.

While it is fairly well known that these rules provide for the privacy and security of Protected Health Information (PHI), the details of the laws: who is covered, what is covered, what is required, etc., is not well understood by either healthcare providers, their business associates or subcontractors.
Our goal is to help make it all clearer. More>