By Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US C/EH Founder & Executive Chairman Introduction The business case for cyber risk management is clear. A cyber incident can lead to consequences that threaten the care and safety of patients. Cyber incidents can also...
The Legal Liabilities of Enterprise Cyber Risk Management
Connecting the Dots Between Cyber Risk and Patient Safety
Bringing Efficiency and Confidence to Your Risk Analysis Processes
Risky Business: How to Conduct a NIST-based Risk Analysis to Comply with the HIPAA Security Rule
In addition to being a HIPAA Security Rule requirement, conducting regular risk analyses is a fundamental business practice, yet many healthcare organizations struggle with the basics, from understanding Introduction Despite many warnings from the Office for Civil...
Build A Culture of Compliance Through Principle-Based Policy Governance
Introduction Organizations of all sizes struggle with embedding policies and procedures successfully into their day-to-day operations. That’s because for many, these policies fill binders and shared drives, overwhelming employees with pages and pages of instruction...
New Standardized Health Care Application Programming Interfaces (APIs)
Will the Hoped-For Rewards from Improved Interoperability and Reduced Information Blocking Outweigh the Potential Impact on the Privacy and Security of Personal Health Information? Jon Moore, MS, JD, HCISPP, Chief Risk Officer and Senior Vice President, Consulting...
How to Make System Activity Reviews an Effective Part of Your Security Program
Introduction As a covered entity or business associate, the Health Insurance Portability and Accountability Act (HIPAA) requires your organization establish procedures and controls to secure electronic protected health information (ePHI). HIPAA’s Security Rule...
Ransomware: The Need for a Business Impact Analysis
Entities Dealing With Email Breach, IT Systems/Phone Outage
Latest Incidents Foreshadow Challenges Heading Into New Year