Register Now

Reserve your seat

Too many organizations are not actively managing known and identified risks. This webinar is designed to help attendees understand risk response fundamentals.
Register Now

Too many organizations are not actively managing known and identified risks. This webinar is designed to help attendees understand risk response fundamentals.

Following the plethora of data breaches and individual complaints, regulatory enforcement agencies are continuing to increase their enforcement actions. It is simply not enough to have completed a risk assessment or be ‘compliant.’ It is one thing to have polished up the problem and perhaps be tempted to just sit back and admire it; however, now that you are know what your risks are, what are you doing about them? How do you develop an overall plan to bring inherent risks determined in the risk analysis process to acceptable levels of residual risk? How do you evaluate options to treat and, therefore, reduce high and critical risks? How do make sure those plans get implemented?

Because many organizations defer to the National Institute of Standards and Technology’s (NIST) standards for managing information risk, this webinar focuses on those security standards and guidelines and is especially important to the risk management team that must protect sensitive information. Organizations that create, receive, maintain or transmit electronic Protected Health Information (ePHI), payment card data and Personally Identifiable Information (PII), company financial information, trade secrets or any other sensitive information are required to or should safeguard this sensitive data from compromise or potentially suffer considerable consequences.

Agenda

In this 60-minute live session, attendees will learn:

  • The regulatory requirements and standards for responding to risk
  • Options for effective risk response
  • Evaluating alternatives to reduce risks
  • How to make sure risk responses get implemented

Date & Time

October 19, 2017

11 am – 12 pm CDT

Register Now

Your Presenter

Jon Stone, MPA, PMP, HCISPP, CRISC
Jon Stone, MPA, PMP, HCISPP, CRISCSVP, Product Innovation

The Challenge

Many organizations are faking information risk management; too many people are untrained / unskilled in information risk response; too few organizations are working to implement risk responses.  Even with skilled and credentialed security professionals, we typically find that they are not necessarily risk managers.

With the increase in the number and severity of data breaches in healthcare, combined with recent FBI alerts such as the April 2014 Private Industry Notification (PIN) entitled “Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain”, healthcare organizations must come to realize that healthcare IS the next cyber security battleground.  The PIN warns:

“Because the healthcare industry is not as “resilient to cyber intrusions [as] the financial and retail sectors, therefore the possibility of increased cyber intrusions is likely.”

Learning Outcomes

If you receive, create, maintain or transmit ePHI or any sensitive information for which you cannot afford loss or harm, you should attend this webinar!

This session is designed to help anyone responsible for protecting sensitive information take immediate action on identified risks.

  • The regulatory requirements and standards for responding to risk
  • Options for effective risk response
  • Evaluating alternatives to reduce risks
  • How to make sure risk responses get implemented
  • All registrants will receive a copy of all slide materials.
Register Now

Reserve your seat

Join us for this complimentary educational webinar and learn the foundations of a strong information risk management program.
Register Now