Conferences / Meetings

Event Categories:

  • search by keywords:

Sponsored Links


  • Conducting a Risk Analysis to Comply with Meaningful Use,

  • Hosted By:
  • ComplianceOnline
  • Start:
  • Tuesday - Apr 22, 2014 10:00 AM
  • End Time:
  • Tuesday - Apr 22, 2014 11:30 AM
  • Location:
  • Online
  • This webinar will discuss how to do a security risk analysis to meet the requirements of HIPAA, HITECH and Meaningful Use attestation. It will describe ways for effectively completing a risk analysis at the organizational level, the network level and the application level.

    Why Should You Attend:
    Risk analysis and risk management plans are the foundation of a HIPAA compliance program and should be complete and provide the documentation that an examiner may ask for. Risk assessments are a key part of effective risk management and facilitate decision making at all three tiers in the risk management hierarchy including the organization level, network level, and information system level. Completing a risk analysis will guide an organization to make cost effective, risk based decisions and provide an enhanced security environment to protect data and reduce the risk of a reportable security breach.
    This webinar will guide the user on the principles of risk analysis and risk management to prioritize risks. It will rely heavily on the NIST 800-30 which is mentioned in the preamble of the original rule and the OCR issued guidance on risk analysis (as revised and finalized on 09/18/2012.)

    This session will:
    -Focus on the key factors in determining and documenting the controls to be implemented regardless of the size of the organization.
    -Explore the processes and methods that can assist organizations prioritize IT security projects by addressing the highest risks to the organization.
    -Review the regulatory requirements for security risk analysis and management.
    -Provide an overview of the types of risk analysis that can be performed.
    -Offer a practical approach on how to comply with regulatory requirements for security risk analysis.
    -Provide information about how to determine where the risks to the organization exist and point organizations to where to look for this information.

    Areas Covered in the Webinar:
    -Requirements of the HIPAA risk analysis security rule
    -Meaningful use requirements and application certification criteria.
    -How risk analysis helps a business make risk based decisions to prioritize security controls and make decisions.
    -How to conduct a HIPAA security risk analysis using NIST 800-30 as a guide
    -How to locate and document the location of protected data
    -How to conduct a risk analysis and how to accomplish the requirement

    Who Will Benefit:
    This webinar will provide valuable assistance to all personnel in medical offices, practice groups, hospitals, academic medical centers, insurers, business associates (shredding, data storage, systems vendors, billing services, etc). The titles are:
    -Compliance Officer
    -Chief Information Officer
    -CEO, CFO
    -Privacy Officer
    -Security Officer
    -Information Systems Managers (Network and Applications)
    -HIPAA Officer
    -Health Information Manager
    -Healthcare Counsel/lawyer
    -Office Manager
  • Website:
  • Visit the website for detail info


No Comments available

© 2009-2020, All Rights Reserved.
Higher Ed Space ® is a registered trademark of AmeriCareers LLC.