Available On Demand
Devices, platforms, programs, and systems cannot be HIPAA-compliant. Only healthcare-related organizations and their business associates accomplish that, by deploying technology that supports sound policy and carefully managed practices. This creates a broad surface of potential exposure requiring protection, and it’s easy for common blind spots to become costly violations. In this session, we explore the top 7 technology-related HIPAA blind spots and discuss how to prevent them from causing an audit failure or non-compliance fines.
The blind spots we’ll discuss include:
1. Keeping Records on Unsecured Systems
2. Failure to Encrypt All Data
3. Internal and External Hacking, Phishing, and Other Social Engineering
4. Poorly or Untrained Employees
5. Loss or Theft of Laptops, Tablets, and other Devices
6. Improper Record and Device Disposal
7. Disclosure of PHI by Business Associates and Other Third Parties
HIPAA Compliance is not “set-it-and-forget-it” but careful planning and thorough execution make it highly manageable. Join Channel Futures Contributor Howard M. Cohen and Joshua Foltz, CISO at eFolder/Axcient, as they break down these blind spots and how you can keep your organization compliant.
If you have already registered, click here to access
Howard Cohen, Contributor, Channel Futures
Howard M. Cohen is a 35+ year executive veteran of the Information Technology industry who continues his commitment to the channel as writer, presenter, and advisor to many channel partners, ISVs, MSPs, CSPs, manufacturers, distributors and more. He is also featured regularly on such IT industry publications as The Dell/Microsoft Migration Expert Zone, Channel Insider, Insight ON Service Providers, Redmond Channel Partner Channel Partner magazine, and MSPMentor.
Joshua Foltz, CISO at eFolder/Axcient
Joshua is a leader in the cyber security space, currently serving as the Chief Security and Compliance Officer at eFolder/Axcient. He has over 15 years progressive security experience in application security, information systems security and information systems in general. This included several years as a security consultant, privacy consultant and penetration tester.
Some of Joshua’s Career accomplishments include the development of training and courseware for assessment testing for financial clients to meet PCI and GLB Requirements; planning and architecting an Application Risk Management, managed services program for Security as a service; architected and implemented global, secure operations center and managed services offering for 24x7 security monitoring; provided “CISO for hire” services, aiding companies in discovering and resolving internal governance, compliance, risk and security issues.