HITRUST: A Business Associate’s Guide to Compliance
Speaker: Jessie Skibbe, VP of Strategic Development and Chief Compliance Officer of KirkpatrickPrice
Have you recently received “the letter” from a top client saying you must become HITRUST CSF certified? Are you trying to stay competitive in the healthcare market? Do you keep hearing about HITRUST CSF, but you’re not quite sure what is it? Join us for this series to learn the basics of HITRUST CSF from our Chief Compliance Officer, Jessie Skibbe. This series will navigate listeners through the framework, provide guidance, and eliminate some of the confusion surrounding HITRUST CSF compliance.
In this webinar, Jessie Skibbe discusses one of the most important steps in the certification journey: scoping. She will cover how to scope your environment for a HITRUST CSF assessment and how to define the risk factors related to your scope.
Why are you here? Have you just received “the letter” from a top client indicating you must become HITRUST CSF Certified within “X” months? Did your boss just you for a project timeline on how long it would take to become HITRUST CSF Certified? Do you need to know how to become HITRUST CSF Certified in order to stay competitive in the healthcare market? Are you are looking for a way to demonstrate compliance with the HIPAA Security Rule? Are you a business associate in the healthcare industry that keeps hearing about HITRUST CSF, but you’re not sure what it is or what it means to be compliant? If any of these apply to you, then this is the webinar for you! Download the full webinar to hear Jessie Skibbe’s expertise on HITRUST CSF requirements.
Audits strengthen business operations, yet many organizations fear audits. In this webinar hosted by LockPath, Joseph Kirkpatrick shares his insights on the auditing process and how your organization can leverage audits to gain a competitive advantage.
In this webinar hosted by LockPath, Jeff Wilder discusses the importance of incident response and the steps your organization can take to create an Incident Response Plan. Wondering what incident response is? Incident response is a predetermined approach for identifying and addressing a security incident, which dictates the procedures following detection to minimize the impact. Incident response planning is vital to your organization. Incidents not handled properly have the potential to be catastrophic in damage and Incident Response Plans prevent business interruption, revenue loss, and loss of customer trust.
What is a Software/Systems Development Cycle? What elements should be included in an SDLC? What is the most important phase in an SDLC? What are the different frameworks? What are the methodology terms? How do you validate compliance with an SDLC? Is the OWASP an SDLC? This webinar educates listeners with an overview on the individual phases and elements that should be included in an SDLC and with some basic knowledge about SDLCs.
https://kirkpatrickprice.com/wp-content/uploads/2017/03/Compliance-is-Never-Enough-Phil-1.png3131018Jenna Kerstenhttps://kirkpatrickprice.com/wp-content/uploads/2016/06/KirkpatrickPrice_Logo.pngJenna Kersten2017-05-26 12:24:312017-06-22 12:53:39Compliance Is Never Enough: Secure Software Development
The purpose of this presentation is to give you a foundation of understanding about encryption. This webinar will not delve into the math involved, but rather, you will learn about the different types of encryption, key management basics, algorithm uses, and encryption attacks.
Completing a comprehensive HIPAA risk analysis is a big achievement and puts you in rare company…but you’re not done yet. At the end of your risk analysis, your organization should be asking: What are we doing to do with this risk? Has management reviewed this and agreed? How can we use this information to improve? A mature risk management program doesn’t ask, “Do we have to do this again?” Instead, your risk management program should incorporate an ongoing, integrated risk analysis. In this webinar, Mark Hinely will discuss five steps to take in order to use the results of your risk analysis: internal reporting, management responsibilities, corrective actions, monitoring, and auditing.
75% of the assessments that we do will generally have a finding regarding patching. So, what’s missing? What can we do to change that? In this webinar, Jeff Wilder, Director of PCI Services at KirkpatrickPrice, discusses best practices for patch management programs, best practices for vulnerability management and identification programs, false assumptions about patching, risk ranking, and tools that he recommends using.
https://kirkpatrickprice.com/wp-content/uploads/2017/03/Compliance-is-Never-Enough-Phil-1.png3131018Jenna Kerstenhttps://kirkpatrickprice.com/wp-content/uploads/2016/06/KirkpatrickPrice_Logo.pngJenna Kersten2017-03-24 16:00:002017-06-19 10:40:29Hardening and System Patching
WEST COAST REGIONAL OFFICE 1 Sansome St. 35th Floor San Francisco, CA 94194