Wednesday, April 13, 2011

Information Security Risk Analysis: Meeting HIPAA Requirements and the Meaningful Use Objective - Webinar By GlobalCompliancePanel




Overview: This sitting will present the background of the regulations that style for information security risk analysis and display how it fits in to one overall information security management process. The endanger analysis process will be presented not beyond the context of the overall risk prioritization and risk mitigation process, using an example.

The Information Security Risk Analysis Process presented utilizes a non-technical come, involving interviewing staff knowledgeable about operations and systems to descry how information is retained and moved, and impart the risks inherent in such storage and transferrence. Interview content is organized as departmental stories that are successively purified into process descriptions, lists of intelligence in place or in motion, diagrams of information flows, and lists of information systems and flows to have ~ing assessed for risks. Risk issues and recommendations as antidote to each system or information flow have power to then be described and organized into a catalogue that is used to define the risks and prioritize their abatement, using a straightforward high-medium-degraded stratification of potential likelihood and stroke for each risk issue, following the put to hazard determination method identified in the prelude to the HIPAA Security Rule and lead from the US Department of Health and Human Services. Areas of noble risk, as identified by respected results organizations, will be identified to render certain that the most significant risks are discovered and adequately prioritized.

The venture analysis process will be applied to a simplified archetype in order to relate the proceeding to a real situation and drift home the usefulness of the measure.

Areas Covered in the Session:

Learn to what degree to conduct an information security put in peril analysis suitable to aid in obedience with the HIPAA Security Rule and other denunciation security regulations relevant to health information managers.

Find out what the rules are that soundness care providers must follow, why they are serious, and what the penalties are as far as concerns not complying, including the new penalties conducive to willful neglect of compliance, which enter upon at $10,000.

See how the peril analysis requirement for meeting the retirement and security objective of meaningful application, necessary for federal funding, fits in by HIPAA compliance.

Learn what steps to follow in the discovery and organization of information needed for the risk analysis.

Find exhausted what are the most significant risks a health care organization faces and how they can be mitigated.

Learn a methodology on account of working through the risk analysis intelligence to discover security strengths and weaknesses and grow a list of priorities for improving palladium compliance.

Discover that staff need not be technicians in order to perform a serviceable risk analysis.

Discover that a dare to undertake analysis can be useful for guiding resolution-making for appropriate policies and procedures, and protection investments.

Who Will Benefit:

Compliance mentor

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/counsel

Office Manager

Contracts Manager

Price List:
Live : $245.00
Corporate live : $995.00
Recorded : $295.00

No comments:

Post a Comment

Blog Archive