POPULARITY
Host Chris Hackett speaks with Sarbjit Singh, Chief Information and Security Officer, Henrik Parkkinen, Information Security Officer at WirelessCar, and Anders Spalding, Founder & Human Risk Management at Spalding Security Solutions, to explore how organizations are fostering positive engagement around cybersecurity. Together, they dive into human risk management, CISO leadership strategies, and the Nordic region's evolving digital security culture. Whether you're focused on building secure teams or enhancing company-wide cyber awareness, this conversation delivers practical insights and real-world experience for today's security professionals.
El gigante tecnológico Microsoft no podía quedarse atrás en el mundo de la inteligencia artificial: Copilot es la herramienta integrada con todo el ecosistema de la marca que te ayudará en tu día a día en el despacho, desde haciendo resúmenes de tus documentos de Word y Excel, hasta apoyándote en tus reuniones de Teams. Nos lo cuenta Alberto Pinedo Lapeña, National Technology & Security Officer en Microsoft, y Asier Crespo, Director Legal de Microsoft Ibérica.
La cybersécurité est l'affaire de tous
2025 8th Annual Capital Link Cyprus Shipping Forum | Digitalization & Cybersecurity – Challenges & Strategies for the Maritime Industry The event highlighted the significant role of Cyprus as a maritime, energy and logistics hub and as an investment and business destination. The Forum featured major international speakers and delegates and local leaders offering an exchange of ideas on critical industry topics, such as developments and trends in the major shipping, financial, and capital markets, issues pertaining to geopolitical and regulatory developments, and technical and commercial fleet management. Moderator: Mr. George A. Tsavliris, Principal – Tsavliris Salvage Group; Conference Chairman Panelists: • Mr. Alexander Oswald, Group Director IT – Columbia Group • Mr. Russell Kempley, Chief Propositions and Security Officer – CyberOwl • Mr. Panos Theodossopoulos, CEO – Metis The Forum took place under the Auspices of the Shipping Deputy Ministry of Cyprus and the Shipping Deputy Minister to the President and in cooperation with the Cyprus Union of Shipowners, which is also the Lead Sponsor. The event was also supported by the Cyprus Shipping Chamber and the other major stakeholders of the Cyprus maritime cluster. Columbia Plaza - Limassol, Cyprus Tuesday, February 18, 2025 More Info: https://shorturl.at/kFzlb #ShippingIndustry #MarineIndustry #ShippingLeadership #MaritimeExperts #Cyprus#Forums #Capitallink
2025 8th Annual Capital Link Cyprus Shipping Forum | Digitalization & Cybersecurity – Challenges & Strategies for the Maritime Industry The event highlighted the significant role of Cyprus as a maritime, energy and logistics hub and as an investment and business destination. The Forum featured major international speakers and delegates and local leaders offering an exchange of ideas on critical industry topics, such as developments and trends in the major shipping, financial, and capital markets, issues pertaining to geopolitical and regulatory developments, and technical and commercial fleet management. Moderator: Mr. George A. Tsavliris, Principal – Tsavliris Salvage Group; Conference Chairman Panelists: • Mr. Alexander Oswald, Group Director IT – Columbia Group • Mr. Russell Kempley, Chief Propositions and Security Officer – CyberOwl • Mr. Panos Theodossopoulos, CEO – Metis The Forum took place under the Auspices of the Shipping Deputy Ministry of Cyprus and the Shipping Deputy Minister to the President and in cooperation with the Cyprus Union of Shipowners, which is also the Lead Sponsor. The event was also supported by the Cyprus Shipping Chamber and the other major stakeholders of the Cyprus maritime cluster. Columbia Plaza - Limassol, Cyprus Tuesday, February 18, 2025 More Info: https://shorturl.at/kFzlb #ShippingIndustry #MarineIndustry #ShippingLeadership #MaritimeExperts #Cyprus#Forums #Capitallink
50 ans d'innovation et d'impact
We speak with Dina Mathers, Chief Information Security Officer, Carvana alongside Nick Mckenzie, Chief Information & Security Officer with Bugcrowd.Dina Mathers, who leads Information Security at Carvana - was recently awarded the CISOs Top 100 Accelerated CISOs Award which recognizes leaders who are shaping the future of cybersecurity. Carvana engages Bugcrowd for bug bounty and vulnerability assessments, with Dina giving candid insights into the scalability, business value and assurances that the Bugcrowd platform provides.Carvana (NYSE: CVNA) is an industry pioneer for buying and selling used vehicles online. As the fastest growing used automotive retailer in U.S. history, its proven, customer-first ecommerce model has positively impacted millions of people's lives through convenient, accessible and transparent experiences.Carvana allows customers to browse a nationwide inventory and purchase a vehicle from the comfort of their home entirely online, benefiting from a 7-day money back guarantee, home delivery and more. Customers also have the option to sell or trade-in their vehicle online in seconds. For more information visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/#bugcrowd #cisoseries #mysecuritytv #cybersecurity
Elige tu propia aventura. La AGI ya está aquí o escalar la IA ya no funciona Entrevistamos a Alberto Pinedo, National Technology and Security Officer en Microsoft España, sobre IA y ciberseguridad. Además: 0:00 Matías es Alan Turing literal6:16 Entrenamos LoRAs en Freepik14:21 Descuentos en Founderz16:37 Vuelve el hype de la AGI... o no26:00 Ilya ha dejado de creer45:43 Entrevista a Alberto Pinedo de Microsoft1:07:04 Startups tróspidas de IA1:15:07 Puerta grande o enfermería Patrocinador: Qué mejor manera de aprovechar las ofertas de Black Friday que formándote en IA con los programas de Founderz, que tienen un 30% de descuento y tres meses de ChatGPT del 14 al 17 de noviembre. Aprenderás a hacer prompt engineering, desarrollar bots y asistentes virtuales, IA generativa, normativa en IA, etc. https://founderz.com/es/ El modelo Llama de Meta se incorporará en programas de defensa de Estados Unidos https://www.parentesis.media/el-modelo-llama-se-incorporara-en-programas-de-defensa-de-ee-uu/ Monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass). Más en monosestocasticos.com - (0) Matías es Alan Turing literal - (06:16) Entrenamos LoRAs en Freepik - (14:21) Descuentos en Founderz - (16:37) Vuelve el hype de la AGI... o no - (26:00) Ilya ha dejado de creer - (45:43) Entrevista a Alberto Pinedo de Microsoft - (1h07) Startups tróspidas de IA - (1h15) Puerta grande o enfermería
Stanley just recalled a lot of mugs due to lid malfunction, we curfuffle the US map, Morgan Waller news, birthdays, pets we had as children, and weekend plans. You can join our Wally Show Poddies Facebook group at www.facebook.com/groups/WallyShowPoddies
Recomendados de la semana en iVoox.com Semana del 5 al 11 de julio del 2021
Elige tu propia aventura. La AGI ya está aquí o escalar la IA ya no funciona Entrevistamos a Alberto Pinedo, National Technology and Security Officer en Microsoft España, sobre IA y ciberseguridad. Además: 0:00 Matías es Alan Turing literal6:16 Entrenamos LoRAs en Freepik14:21 Descuentos en Founderz16:37 Vuelve el hype de la AGI... o no26:00 Ilya ha dejado de creer45:43 Entrevista a Alberto Pinedo de Microsoft1:07:04 Startups tróspidas de IA1:15:07 Puerta grande o enfermería Patrocinador: Qué mejor manera de aprovechar las ofertas de Black Friday que formándote en IA con los programas de Founderz, que tienen un 30% de descuento y tres meses de ChatGPT del 14 al 17 de noviembre. Aprenderás a hacer prompt engineering, desarrollar bots y asistentes virtuales, IA generativa, normativa en IA, etc. https://founderz.com/es/ El modelo Llama de Meta se incorporará en programas de defensa de Estados Unidos https://www.parentesis.media/el-modelo-llama-se-incorporara-en-programas-de-defensa-de-ee-uu/ Monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass). Más en monosestocasticos.com - (0) Matías es Alan Turing literal - (06:16) Entrenamos LoRAs en Freepik - (14:21) Descuentos en Founderz - (16:37) Vuelve el hype de la AGI... o no - (26:00) Ilya ha dejado de creer - (45:43) Entrevista a Alberto Pinedo de Microsoft - (1h07) Startups tróspidas de IA - (1h15) Puerta grande o enfermería
Elige tu propia aventura. La AGI ya está aquí o escalar la IA ya no funciona Entrevistamos a Alberto Pinedo, National Technology and Security Officer en Microsoft España, sobre IA y ciberseguridad. Además: 0:00 Matías es Alan Turing literal6:16 Entrenamos LoRAs en Freepik14:21 Descuentos en Founderz16:37 Vuelve el hype de la AGI... o no26:00 Ilya ha dejado de creer45:43 Entrevista a Alberto Pinedo de Microsoft1:07:04 Startups tróspidas de IA1:15:07 Puerta grande o enfermería Patrocinador: Qué mejor manera de aprovechar las ofertas de Black Friday que formándote en IA con los programas de Founderz, que tienen un 30% de descuento y tres meses de ChatGPT del 14 al 17 de noviembre. Aprenderás a hacer prompt engineering, desarrollar bots y asistentes virtuales, IA generativa, normativa en IA, etc. https://founderz.com/es/ El modelo Llama de Meta se incorporará en programas de defensa de Estados Unidos https://www.parentesis.media/el-modelo-llama-se-incorporara-en-programas-de-defensa-de-ee-uu/ Monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass). Más en monosestocasticos.com - (0) Matías es Alan Turing literal - (06:16) Entrenamos LoRAs en Freepik - (14:21) Descuentos en Founderz - (16:37) Vuelve el hype de la AGI... o no - (26:00) Ilya ha dejado de creer - (45:43) Entrevista a Alberto Pinedo de Microsoft - (1h07) Startups tróspidas de IA - (1h15) Puerta grande o enfermería
We speak with Dina Mathers, Chief Information Security Officer, Carvana alongside Nick Mckenzie, Chief Information & Security Officer with Bugcrowd.Dina Mathers, who leads Information Security at Carvana - was recently awarded the CISOs Top 100 Accelerated CISOs Award which recognizes leaders who are shaping the future of cybersecurity. Carvana engages Bugcrowd for bug bounty and vulnerability assessments, with Dina giving candid insights into the scalability, business value and assurances that the Bugcrowd platform provides.Carvana (NYSE: CVNA) is an industry pioneer for buying and selling used vehicles online. As the fastest growing used automotive retailer in U.S. history, its proven, customer-first ecommerce model has positively impacted millions of people's lives through convenient, accessible and transparent experiences.Carvana allows customers to browse a nationwide inventory and purchase a vehicle from the comfort of their home entirely online, benefiting from a 7-day money back guarantee, home delivery and more. Customers also have the option to sell or trade-in their vehicle online in seconds. For the full interview and more information visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/#bugcrowd #cisoseries #mysecuritytv #cybersecurity
We speak with Dina Mathers, Chief Information Security Officer, Carvana alongside Nick Mckenzie, Chief Information & Security Officer with Bugcrowd.Dina Mathers, who leads Information Security at Carvana - was recently awarded the CISOs Top 100 Accelerated CISOs Award which recognizes leaders who are shaping the future of cybersecurity. Carvana engages Bugcrowd for bug bounty and vulnerability assessments, with Dina giving candid insights into the scalability, business value and assurances that the Bugcrowd platform provides.Carvana (NYSE: CVNA) is an industry pioneer for buying and selling used vehicles online. As the fastest growing used automotive retailer in U.S. history, its proven, customer-first ecommerce model has positively impacted millions of people's lives through convenient, accessible and transparent experiences.Carvana allows customers to browse a nationwide inventory and purchase a vehicle from the comfort of their home entirely online, benefiting from a 7-day money back guarantee, home delivery and more. Customers also have the option to sell or trade-in their vehicle online in seconds. For the full interview and more information visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/#bugcrowd #cisoseries #mysecuritytv #cybersecurity
We speak with Dina Mathers, Chief Information Security Officer, Carvana alongside Nick Mckenzie, Chief Information & Security Officer with Bugcrowd.Dina Mathers, who leads Information Security at Carvana - was recently awarded the CISOs Top 100 Accelerated CISOs Award which recognizes leaders who are shaping the future of cybersecurity. Carvana engages Bugcrowd for bug bounty and vulnerability assessments, with Dina giving candid insights into the scalability, business value and assurances that the Bugcrowd platform provides.Carvana (NYSE: CVNA) is an industry pioneer for buying and selling used vehicles online. As the fastest growing used automotive retailer in U.S. history, its proven, customer-first ecommerce model has positively impacted millions of people's lives through convenient, accessible and transparent experiences.Carvana allows customers to browse a nationwide inventory and purchase a vehicle from the comfort of their home entirely online, benefiting from a 7-day money back guarantee, home delivery and more. Customers also have the option to sell or trade-in their vehicle online in seconds. For the full interview and more information visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/#bugcrowd #cisoseries #mysecuritytv #cybersecurity
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
This year's Singapore Fintech Festival surrounds six major themes that will frame 2025. At the front and centre of discussions is the Roadmap for AI and Quantum. Of particular focus this year is the boom in generative AI, which uses algorithms to identify patterns within existing data to come up with new content, ranging from text, images, videos and even codes. The technology is said to hold the potential to radically change the financial services industry, with an EY analysis suggesting that rethinking the financial institution with Gen AI at its core has the potential to create US$200 billion to US$400 billion by 2023, with productivity gains reaching up to 30 per cent by 2028. In this panel discussion on the Roadmap for AI and Quantum, we looked at where fintech players are at right now when it comes down to generative AI adoption and what the road to achieving an AI-embedded future looks like for them. We also dived into emerging risks surrounding AI and challenges surrounding the adoption of quantum computing. Money Matters' Finance Presenter Chua Tian Tian spoke with Lim Him Chuan, Group Head of Strategy, Transformation, Analytics & Research (GSTAR) and Group Executive at DBS, as well as Phoram Mehta, Senior Director and Chief Information and Security Officer, International Markets at Paypal for more, as part of MONEY FM's on the ground coverage of Singapore Fintech Festival 2024.See omnystudio.com/listener for privacy information.
Transaction screening is like extra second of bullet time you see movies – where the action hero moves in slow-motion as everything whizzes around them.It's that split-second before a transaction goes through, which could be the difference between stopping criminals washing their funds through your payments platform, or not.Our expert host, Fredrik Riiser, is joined by Nick Portalski, Chief Solutions and Security Officer at Napier AI, to discuss everything you need to know about transaction screening. The pair discuss: what transaction screening looks like today, the biggest challenges in its way, and how things can evolve going forward.Producer: Matthew Dunne-MilesEditor: Dominic DelargyEngineer: Nicholas Thon____________________________________The Laundry Live returns to London on 30 Oct at the Ministry of Sound! Keynote, podcast, DJ, and launch of the first AML Megaminds report.Grab your ticket here!____________________________________The Laundry podcast: Dive deep into the intricacies of financial crime, AML (anti-money laundering), compliance, sanctions, and the ever-evolving landscape of financial regulation.Hosted by Marit Rødevand and Fredrik Riiser – this podcast features renowned experts from banking, fintech, compliance, and investigative journalism.Together, they shed light on the industry's trending topics, analyse mainstream news through a compliance-focused lens, and connect the fight against financial crime to its real-world consequences and ramifications.The Laundry is proudly produced by Strise, the AML Automation Cloud.Get in touch at: laundry@strise.aiSubscribe to our newsletter, Fresh Laundry, here. The views, opinions, and statements expressed by guests of this podcast are solely their own and do not necessarily reflect the views, opinions, or positions of the podcast hosts, The Laundry team, or Strise. Hosted on Acast. See acast.com/privacy for more information.
It is bad enough the Democrat State of Texas elected officials deny our constitutional rights to bear arms in the most dangerous part of DFW, but now we have to worry about security arresting law abiding citizens who attend with legal conceal carry licenses. Meanwhile the Trend De Arragua and Gangbangers will be at the ready to vandalize and suppress the crowds that attend!Support the show: http://www.wbap.com/chris-krok/See omnystudio.com/listener for privacy information.
In this episode, Casey Hossa, Chief Information Officer & Security Officer at Health New England, delves into the evolving landscape of digital transformation in healthcare. Casey shares his expertise on the integration of AI, the importance of robust security measures, and the critical role of value-based care in driving future growth.
In this episode, Casey Hossa, Chief Information Officer & Security Officer at Health New England, delves into the evolving landscape of digital transformation in healthcare. Casey shares his expertise on the integration of AI, the importance of robust security measures, and the critical role of value-based care in driving future growth.
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we discuss what to consider when designating your security officer in a mental health group practice. We discuss: What a security officer is The difference between a security officer and a privacy officer and what each is responsible for Who can be a security officer, and whether the role can be outsourced The qualities to look for when appointing a security officer or deputy security officer The time commitment required to be a security officer How PCT's resources can help your practice's security officer Listen here: https://personcenteredtech.com/group/podcast/ PCT Resources: PCT's Security Officer Endorsement Training Program (10 legal-ethical CE credit hours) Group Practice Care Premium weekly (live & recorded) direct support & consultation with the PCT team + Eric Ström, JD PhD LMHC (monthly) Group Practice Office Hours Device Security: assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) Remote Workspace Security: assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks and implement required safeguards. HIPAA compliance, risk management, and practice optimization resources and support from PCT for mental health group practices
In this episode, we uncover the world of physical security with Brian, an expert who has safeguarded venues and various establishments. Discover the realities of working in the industry and learn how to navigate challenging situations on the spot. Brian also shares his remarkable journey as a former Strong Man competitor, giving us an insider's look at his experiences in the high-pressure world of strength competitions. This episode is made possible by The Pearl On Main. https://thepearlonmain.com/ Contact: Voicemail/Text: 385-988-0042 Website: http://www.theweeklyinsalt.com Instagram: https://www.instagram.com/the_weekly_insalt TikTok: https://www.tiktok.com/@theweeklyinsalt
Howdy, y'all! In part two of our three-part miniseries, we tackle Process with Malcolm Harkins. Malcolm is former CISO at Intel, a good friend of Allan's, former Cylance Chief Trust and Security Officer, member of the board of director over at TrustMAPP (where Allan used to be COO), and is now at Hidden Layer, working to secure AI. Hidden Layer did not sponsor this show. Allan, Drew and Malcolm discuss the following: People, process technology – what is the role of process in that triad? How do we craft good process? What part of process definition is capturing the as-is state vs. being aspirational? How do we ensure good process is followed? When should technology drive process vs process drive technology? Where does process traditionally fall short? What would you improve about process in general? Tell us a bit about Hidden Layer, as this is some very new technology... Thank you for listening! Y'all be good now!
In this episode we're exploring the world of single sign-on, and why it's necessary for your organization. You'll hear from Chief Technology Officer and Security Officer, Jason Collins, about SSO and how it's commonly used in businesses to improve user experience, streamline their access to work applications especially cloud-based ones, and improves security by reducing the need to manage multiple passwords, among others.
In today's climate, ensuring safety in educational settings is paramount. Join us for "Prevent Harm" a crucial installment in the "Path to Safer Schools" series. This podcast brings together a panel of esteemed experts, from diverse backgrounds such as education, law enforcement, mental health, and technology. Together, they will explore innovative strategies and community engagement tactics to safeguard our students.Panel Discussion Overview:The "Prevent Harm" podcast is tailored to equip educators, administrators, parents, and policymakers with actionable insights to cultivate safer school environments. Our panel will engage in dynamic discussions covering topics such as:Early Identification of Risks: Proactive approaches to identify and mitigate potential threats, leveraging behavioral assessments and social media monitoring.Building a Culture of Safety: Strategies to foster a secure and supportive school culture where reporting concerns is encouraged.Innovative Safety Technologies: Exploration of cutting-edge technologies, from advanced security systems to anonymous reporting apps, to bolster school safety.Mental Health and Well-being: test technological advancements that can enhance school safety, from advanced security systems to apps that facilitate anonymous reporting.Mental Health and Well-being: Addressing the critical importance of mental health services in schools as a preventative measure, including counseling, peer support programs, and staff training.Community and Law Enforcement Collaboration: Effective models for collaboration between schools, local communities, and law enforcement agencies to ensure a coordinated response to safety concerns.Policy and Legislative Considerations: Discussion on current and proposed policies impacting school safety and how attendees can advocate for positive change.Speakers Kevin Eberle, EdDCOO Buffalo Public Schools, Ret.·Edingenuity, LLCDr. Kevin Eberle brings over 27 years of experience as a building administrator and former police officer to the field of education consulting, focusing on safety and culture change. As a retired school principal and COO of Buffalo Public Schools, he has also served as a teacher, counselor, and assistant principal. Dr. Eberle's multidisciplinary approach emphasizes trauma-informed care, restorative practices, and positive staff development with mindfulness techniques, demonstrating how these strategies can transform a school's culture and fabric. He is an associate with Zeal Education Group and serves on the boards of the Police Athletic League, Family Justice Center, OLV Humane Service, and Zero Now. John BullwinkelRetired US Secret ServiceJohn Bullwinkel is an accomplished Secret Service Special Agent with over 20 years of experience in national and global security leadership, focusing on personnel and facilities in the nation's capital. Transitioning to a Threat Manager role in the public sector, John brings extensive expertise in high-level security assurance and threat management. His skills encompass security system assessments, risk mitigation, high-level security operations, executive-level protection, tactical team operations, logistics, event security planning, and team leadership. Known for building valuable relationships, John excels in collaborating with stakeholders, management, team members, vendors, and clients at all organizational levels. Brian KatzSafer School SolutionsBrian Katz most recently served as the Chief Safety and Security Officer for the Broward County Public School District, the nation's 6th largest school district. With over 20 years of experience in physical security, investigations, and executive protection, he has provided security consulting for Fortune 500 companies and other unique clients.At Google, Mr. Katz was the Director of Personnel Protective Services, where he built Google's Global Security Investigations and Intelligence teams from a single person to an industry-leading strategic global organization. He developed the Executive Protection Group, Intelligence Group, and the Global Security Operations Center, managing the company's Aviation program and responding to emergent threats worldwide.Following the Marjory Stoneman Douglas High School tragedy in 2018, Broward County School District created a Division of Safety, Security, and Emergency Preparedness as a Cabinet-level Chief position. Mr. Katz was selected to fill this role in February 2019 after a national search. In this position, Mr. Katz designed the new Division from the ground up, centralizing all safety and security functions, doubling the number of security staff, and creating layers of safety and security accountability. He also developed a comprehensive safety and security training framework, rolling out these initiatives district-wide.
Dave Stutheit, Former Secret Service, Current Johnson County Security Officer | 7-15-24See omnystudio.com/listener for privacy information.
In Which Murderer's 48th episode of Season 6, the girls cover Security Guard Murders. Mel starts us off with the controvercial case involving Jemel Robertson, before Holly goes over the horrifically violent story of James Airlie. Listener Karen suggested this week's topic - thanks so much! This week's episode begins with your usual weather update, Holly's drama-filled journey to the middle of nowhere, preparations for the girls Eurovision Song Contest party and travel tales with burning skin.Production, recording and post production completed by Holly who has Consulting Producer Craig's demo tape ready for next year's contest.Holly edited this week. All complaints should be sent directly to Mel while Consulting Producer Craig tells Holly to stop recording him singing in the shower and also to get out of his house.Big thank you to all our listeners for subscribing, leaving fantastic reviews and sending in great theme suggestions.WE HAVE MERCH! www.whichmurderer.com - CLICK ON THE MERCHANDISE TAB FOR A LINK!WARNING - Explicit language, content and themes (plus whatever else will cover us legally). All opinions stated are our own and case information was gathered from legitimate sources within the public realm.Pre-recorded in Scotland
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Aaron Painter. Aaron is the CEO of Nametag Inc., the company who invented "Sign in with ID" as a more secure alternative to passwords. After watching too many friends and family members fall victim to identity theft and online fraud, Aaron assembled a team of security experts to build the next generation of online account protection. Nametag has a mission to bring authenticity to the internet and enable people to build more trusted relationships. They believe security should be centered around you, the user, and that your identity - like your privacy - is a valuable asset worth protecting. Having lived and worked in six countries across four continents, Aaron exemplifies a new generation of global leaders. In his 2017 best-selling book, LOYAL, he describes his key to leadership: fostering a culture of listening. Through codifying and implementing a business framework of listening, Aaron has built success across the world. [May 20, 2024] 00:00 - Intro 00:20 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:34 - Aaron Painter Intro 04:47 - The Road to Cybersecurity 07:45 - Protecting the Help Desk 10:44 - Fixing the Process 15:17 - The Person Behind the Screen 19:22 - A Matter of Trust 21:55 - Cultural Divide 24:17 - Culture Influencing Security 25:23 - Tips for a New CISO 29:50 - Mentors 32:16 - Book Recommendations - Elon Musk - Walter Isaacson - The Coming Wave - Mustafa Suleyman - Loyal - Aaron Painter 35:02 - Find Aaron Painter online - LinkedIn: linkedin.com/in/aaronpainter - Website: www.getnametag.com 35:45 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
In 2015, Deion Sanders' son was party to an incident that changed a man's life forever. John Darjean, a former New York Yankees prospect turned high school baseball coach and security officer, was attacked by Shilo Sanders. The incident would leave Darjean permanently disabled and financially impaired, despite winning a nearly $12 million settlement from the Sanders family. Darjean joins “Fearless” to share his full story without the censorship he's received from media outlets like TMZ, Amazon, and Tubi. His sad tale shines a light on Coach Prime that's far different than the spotlight the mainstream media bathes the sports idol in. Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we explain the cybersecurity goals as outlined by Health and Human Services (HHS) in light of the upcoming HIPAA Security Rule changes. We discuss the different categories of goals that are outlined; being proactive so your practice is ready when changes come; the essential goals HHS has outlined and what they mean; the encouraged goals HHS has outlined and what they mean; why these goals make sense; and how the PCT Way can help you meet these cybersecurity goals. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources HHS Announces Next Steps in Ongoing Work to Enhance Cybersecurity for Health Care and Public Health Sectors Healthcare Sector Cybersecurity Concept Paper HealthIT Security article: CISA Issues Revised Cybersecurity Performance Goals HealthIT Security article: HHS Unveils Healthcare Cybersecurity Performance Goals HHS' Healthcare & Public Health Cybersecurity Performance Goals PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently **includes policy prohibition on use of BCC and CC; workforce forwarding emails from their practice email account to personal email account; data entry checking/not using autofill suggestions for recipients -- the P&P components that address the email gone awry situations we discussed in the podcast episode Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we give group practice owners a heads up about upcoming changes to the HIPAA Security Rule. We discuss what the focus of these rule changes will be; why the changes are happening; steps you can take to be proactive about HIPAA changes; and PCT's practical tools to help you get on top of things in a manageable way. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources & Further Information Vital Signs: Digital Health Law Update | Winter 2024 | JD Supra 2024 Update: Regulators Use “Carrots and Sticks” to Incentivize Healthcare Sector Cybersecurity Compliance 3 ways to prepare for impending HIPAA Security Rule updates HHS Unveils Healthcare Cybersecurity Strategy PCT Resources HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently **includes policy prohibition on use of BCC and CC; workforce forwarding emails from their practice email account to personal email account; data entry checking/not using autofill suggestions for recipients -- the P&P components that address the email gone awry situations we discussed in the podcast episode Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we share ways to be proactive in light of the news that random HIPAA audits are returning. We discuss why there's still no HIPAA police; the function of these random audits; where the gaps in compliance have been historically; what auditors will likely be looking for; the importance of risk analyses, risk mitigation plans, and policies & procedures; how many HIPAA covered entities were audited the last time the program was active; and PCT's resources to help you get started with formal compliance in a shame-free way. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources & further information: Results of prior audit period HHS Notice in the Federal Register JD Supra article: Never Say Never Again: HHS Signals the Return of HIPAA Audit Program PCT Resources HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently **includes policy prohibition on use of BCC and CC; workforce forwarding emails from their practice email account to personal email account; data entry checking/not using autofill suggestions for recipients -- the P&P components that address the email gone awry situations we discussed in the podcast episode Policies & Procedures include Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
In a cell, Lister and Rimmer are having another furious argument. We are then shown the circumstances that led to their incarceration... Three days earlier, Kryten's nanobots had rebuilt Red Dwarf, but done so far too large. Lister enters the cockpit, showing off his now non-muscular body, and it emerges that the enlargement is a temporary symptom of the nanobots' restoration process, as it soon turns out that Red Dwarf is shrinking around Starbug. Suddenly, the ship is sucked into an air vent. With Red Dwarf almost completely shrunk, the corridors rip off the rear and middle section of Starbug before the cockpit is sent flying into a cargo bay where it crash-lands, and the crew manage to escape mere seconds before it explodes. The crew are approached by two figures recognised by Lister... Selby and Chen. The nanobots have not only restored Red Dwarf but also its crew. Captain Hollister then arrives with a Security Officer who places Lister under arrest for stealing and crashing a Starbug, flying without a pilot's licence and bringing two stowaways (The Cat and Kryten) aboard. Everyone is placed in custody and Lister is confined to quarters. He then asks Holly (who is still loaded into Lister's watch and therefore hidden from the crew of Red Dwarf) what will happen if they are found guilty. Holly explains that they will get two years in the brig. Lister is confused, as Red Dwarf does not have a brig, but Holly explains that there is a top-secret prison facility contained aboard the ship, holding hundreds of inmates who were being transported to a containment facility. Unfortunately, they have all been resurrected too. Just as he thinks things cannot get any worse, Rimmer enters the bunkroom. However, this is not the Rimmer that left Starbug to take on his alter-egopersona of Ace, but rather the Rimmer that was aboard Red Dwarf before the accident that wiped out the crew. Lister tells Rimmer the whole story and asks for help in escaping. In exchange, he offers Rimmer a copy of the crew's personal and confidential files that exist on Starbug. Rimmer initially refuses, until Lister tells him that with the information, he can get the promotion to officer status like he has always wanted. Rimmer agrees and Lister gives him his watch which Holly has been loaded into. The Cat and Kryten are taken for medical and psychiatric evaluation. Unfortunately, Kryten's erratic personality does not go over well, and he is recommended to be restored to his factory settings. Aboard the burnt out wreckage of the cockpit of Starbug, Rimmer finds the disc with the crew's files. He also finds two strange tubes that are the positive viruses that Lister picked up from a Dr. Hildegarde Lanstrom, years earlier. Rimmer quickly tries out sexual magnetism, and walks down the corridor where all the women admire him. Rimmer notes to himself that 'the world loves a bastard'.
Want to listen ad-free? Try it FREE for 7 days here: Ad-free podcast Author: Matt Doggett Facebook Page: https://www.facebook.com/MatthewDoggettAuthor/ Website/Newsletter sign up: matthewdoggettauthor.com New Book Releases: https://www.amazon.com/Matthew-G-Doggett/e/B08FD5378Z * * * DISCLAIMER: This episode contains explicit content. Parental guidance is advised for children under the age of 18. Listen at your own discretion. #drnosleep #scarystories #horrorstories #doctornosleep #truescarystories #horrorpodcast #horror Learn more about your ad choices. Visit megaphone.fm/adchoices
Want to listen ad-free? Try it FREE for 7 days here: Ad-free podcast Author: Matt Doggett Facebook Page: https://www.facebook.com/MatthewDoggettAuthor/ Website/Newsletter sign up: matthewdoggettauthor.com New Book Releases: https://www.amazon.com/Matthew-G-Doggett/e/B08FD5378Z * * * DISCLAIMER: This episode contains explicit content. Parental guidance is advised for children under the age of 18. Listen at your own discretion. #drnosleep #scarystories #horrorstories #doctornosleep #truescarystories #horrorpodcast #horror Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we summarize what group practice owners should know about the Office of Civil Rights Annual Reports to Congress and explain how understanding them can inform risk management. We discuss the compliance report from the Office of Civil Rights (OCR); how complaints filed were resolved; compliance reviews vs. audits; reframing the (very common) fear of HIPAA complaints; the unsecured PHI report from the OCR; risk management for avoiding large breaches; the importance of reporting breaches; and the primary sources of breaches and ways to minimize them. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. References Annual Report to Congress on Breaches of Unsecured Protected Health Information Annual Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently **includes policy prohibition on use of BCC and CC; workforce forwarding emails from their practice email account to personal email account; data entry checking/not using autofill suggestions for recipients -- the P&P components that address the email gone awry situations we discussed in the podcast episode Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
Wednesday, February 7th, 2024Today, the DC Circuit rules unanimously that former presidents, especially Trump, do not enjoy absolute immunity; Judge Engoron writes an email asking for input from the parties in the NYAG civil fraud trial about the Weisselberg perjury charge; Jennifer Crumbley has been found guilty on all four counts of involuntary manslaughter; James O'Keefe of Project Veritas admits he's full of shit pursuant to a court settlement; Mitch McConnell reneges on the border deal and President Biden puts the blame directly on Trump; Brett Favre has to finish repaying the Mississippi welfare money he stole; a Marine veteran is suing Jack Burkman and Jacob Wohl; the House backs off on impeaching secretary Mayorkas; Hakeem Jeffries told the House Democratic Caucus this morning that he will vote against the standalone bill to send $17.6 billion to Israel; a Trump State Department security officer has been arrested for his role in the insurrection. Plus Allison and Dana deliver your good news. Promo CodeGet 30% off your first order, plus free shipping today at Microdose.com, promo code DAILYBEANS. DC Circuit Court Presidential Immunity Ruling (Full text pdf)https://www.cadc.uscourts.gov/internet/opinions.nsf/1AC5A0E7090A350785258ABB0052D942/$file/23-3228-2039001.pdfJennifer Crumbley, mother of Ethan Crumbley, found guilty of involuntary manslaughter in son's school shootinghttps://www.nbcnews.com/news/us-news/jennifer-crumbley-trial-verdict-rcna136937Ex-NFL quarterback Favre must finish repaying misspent welfare money, Mississippi auditor sayshttps://apnews.com/article/brett-favre-mississippi-welfare-money-nfl-59d5047f9e8b1cd6055f13697eea7027State Department diplomatic security officer arrested on Jan. 6 chargeshttps://www.nbcnews.com/politics/justice-department/state-department-diplomatic-security-officer-arrested-jan-6-charges-rcna137509Marine Vet Accuses Jack Burkman and Jacob Wohl of Smear Job in $11M Lawsuithttps://www.thedailybeast.com/marine-vet-accuses-jack-burkman-and-jacob-wohl-of-smear-job-in-dollar11m-lawsuitSubscribe to Lawyers, Guns, And MoneyAd-free premium feed: https://lawyersgunsandmoney.supercast.comSubscribe for free everywhere else:https://lawyersgunsandmoney.simplecast.com/episodes/1-miami-1985Check out other MSW Media podcastshttps://mswmedia.com/shows/Follow AG and Dana on Social MediaDr. Allison Gill Follow Mueller, She Wrote on Posthttps://post.news/@/MuellerSheWrote?utm_source=TwitterAG&utm_medium=creator_organic&utm_campaign=muellershewrote&utm_content=FollowMehttps://twitter.com/MuellerSheWrotehttps://www.threads.net/@muellershewrotehttps://www.tiktok.com/@muellershewrotehttps://instagram.com/muellershewroteDana Goldberghttps://twitter.com/DGComedyhttps://www.instagram.com/dgcomedyhttps://www.facebook.com/dgcomedyhttps://danagoldberg.comHave some good news; a confession; or a correction?Good News & Confessions - The Daily BeansFrom the Good NewsBest Jazz Vocal Album Winner Nicole Zuraitishttps://www.nicolezmusic.com/fycRandom Acts Of Flowershttps://rafknoxville.org Listener Survey:http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=shortFollow the Podcast on Apple:The Daily Beans on Apple PodcastsWant to support the show and get it ad-free and early?Supercast https://dailybeans.supercast.com/OrPatreon https://patreon.com/thedailybeansOr subscribe on Apple Podcasts with our affiliate linkThe Daily Beans on Apple Podcasts
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we talk about ways to prevent HIPAA email breaches in a group practice setting. We discuss common email-related breaches we see for group practices; email and PHI; large vs. small breaches; the implications of having a HIPAA breach; policies and procedures to mitigate email errors; how to send mass client notifications securely; settings to have in place in your email service; and what makes an email service HIPAA compliant. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources PCT's Google Workspace Configuration Learning Center (see part 9, 'the sharing and the forwarding', for tutorial on managing forwarding settings) Free CE course: Introduction to HIPAA Security for Group Practice Leaders (1 legal-ethical CE course) OCR Breach Report Questions -- know the contents of what is asked/what you need to provide *before* starting the breach report in the OCR's online portal for breach reporting CE course: HIPAA Security Incidents & Breaches: Investigation, Documentation, And Reporting (1.5 legal-ethical CE credit hours) Group Practice Care Premium for weekly (live & recorded) direct support & consultation, Group Practice Office Hours, with the PCT team + Eric Ström, JD PhD LMHC (monthly) PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently **includes policy prohibition on use of BCC and CC; workforce forwarding emails from their practice email account to personal email account; data entry checking/not using autofill suggestions for recipients -- the P&P components that address the email gone awry situations we discussed in the podcast episode Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
After 7 years of flying as an Apache Helicopter Pilot for the Army, Ryan Fugit knew it was time to settle down. So naturally, he moved back to the States, settled in with his family, and immediately joined the CIA as a Collection Management Officer. But working at The Agency isn't all office work - Ryan spent time in Europe and North Africa, rubbing elbows with some of the most unique individuals in spy craft. He even took his kids on a couple of operations, though they'd never know it at the time. And after all that, he took up securities work at huge Fortune 500 companies, tracking down some of the most illicit material on the internet and serving justice to the most offending trolls on the internet. Now, he hosts Combat Story, a podcast dedicated to sharing stories from veterans just like our very own Mike Ritland, but that's far from the only detail worth sharing. How did Ryan's time at the CIA change with the constant influx of new tech, like facial recognition? Why are the world's most popular search engines seemingly so biased, and is there anything we can do about it? And when it really comes down to it, just how awful can people be to each other from behind the illusory safety of a keyboard? ---------- Subscribe to Combat Story (Podcast) on Spotify - https://open.spotify.com/show/1HfaevfdgCfgc5Zjpcq99a?si=827659e3ddc04619 Support Ryan Fugit - Website: https://www.combatstory.com Instagram: https://www.instagram.com/combatstory YouTube: https://www.youtube.com/channel/UCCyApoJr-mNmdMNwdk22xEQ ---------- Sponsors: Contingency Medical Don't Wait! Go to https://www.contingencymedical.com/mikedrop now and enter promo code MIKEDROP for $20 off any pack! That's $20 off ANY pack at https://www.contingencymedical.com/mikedrop with promo code MIKEDROP! ---------- ZBiotics Go to zbiotics.com/MIKEDROP to get 15% off your first order when you use MIKEDROP at checkout. ZBiotics is backed with 100% money back guarantee so if you're unsatisfied for any reason, they'll refund your money, no questions asked. Remember to head to https://www.zbiotics.com/mikedrop and use the code MIKEDROP at checkout for 15% off. Thank you ZBiotics for sponsoring this episode and our good times. ---------- BUBS Naturals The BUBS namesake derives from Glen ‘BUB' Doherty, who was heroically killed in Benghazi, Libya in 2012. In addition to remembering Glen for the patriot he is, the BUBS ethos centers around the passionate and adventure seeking life that Glen lived. BUBS Naturals products are rooted in sustainably sourced ingredients and controlled consistency to provide our customers with the highest quality Collagen Protein & MCT Oil Powder that help you feel amazing and live a fuller life. Our mission is simple. FEEL GREAT. DO GOOD. 10% always goes back to charity, helping military men and women transition back into civilian life. Go to https://www.bubsnaturals.com and use code MIKEDROP for 20% off your order. ---------- Fueled by TeamDog | www.mikeritlandco.com | @Teamdog.pet ALL THINGS MIKE RITLAND: SHOP for Fueled By Team Dog Performance Dog Food, Treats, Apparel, Accessories, and Protection dogs - MikeRitlandCo.com - https://www.MikeRitlandCo.com Team Dog Online dog training - TeamDog.pet - https://www.TeamDog.pet Learn more about your ad choices. Visit podcastchoices.com/adchoices
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we explain steps to take if your therapy practice had a HIPAA breach this year. We discuss normalizing breaches emotionally; what constitutes a breach; the breach reporting timeframe; what the breach reporting process consists of; what to expect in terms of a response for a breach report; things regulators love to see in a breach report; the importance of preventing a breach from reoccurring; and resources we have available to support you during breach reporting. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources OCR Breach Report Questions -- know the contents of what is asked/what you need to provide *before* starting the breach report in the OCR's online portal for breach reporting CE course: HIPAA Security Incidents & Breaches: Investigation, Documentation, And Reporting (1.5 legal-ethical CE credit hours) Group Practice Care Premium for weekly (live & recorded) direct support & consultation, Group Practice Office Hours, with the PCT team + Eric Ström, JD PhD LMHC (monthly) PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy **Security Incident Response and Breach Notification Policy** Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement **Security Incident Report** PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis **Security Incident Response** Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
Guests: Malcolm Harkins, Chief Security & Trust Officer at Epiphany SystemsOn LinkedIn | https://www.linkedin.com/in/malcolmharkins/Robb Reck, Chief Trust and Security Officer at Red CanaryOn LinkedIn | https://www.linkedin.com/in/robbreck/Host: Matthew RosenquistOn ITSPmagazine
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're talking about ways to start 2024 off with an optimized and fortified group practice. We discuss starting the new year on a solid foundation; reviewing current group practice systems and tech stacks; ensuring your team has the training they need; checking devices and device security; risk analysis and mitigation; reviewing policies and procedures as well as HIPAA manuals; and the PCT resources that can help you with each of these tips. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources Article: 5 Practical Tips for Tidying Things up in Your Practice at the End of the Year Comprehensive PCT Way HIPAA Compliance Bundle for Group Practices Service Review Resources: PCT's Group Practice Service Selection Workbook & Worksheets (free!! Step 1 of the PCT Way) -- support for reviewing (and selecting) HIPAA-secure, effective, and economical services to meet your practice's functionality and operational needs Training resources: PCT's HIPAA, mental health privacy ethics, and teletherapy role-based foundational trainings for mental group practices + topical needs-based trainings Device security resources: Group Practice Care Premium for weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces(for *all* team members at no per-person cost) + more Computer and Smartphone HIPAA Security Checklist for Therapists Risk Analysis & Mitigation Resources: PCT's HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. Will identify both your 'in-practice' risks and your 'formal compliance' (what required written P&Ps are implemented) needs, while also documenting all the good things your practice is already doing! PCT's Mini Risk Analysis/Needs Identification 'Circle' Tool (free!) PCT Article: Why Risk Analysis is a Fundamental Requirement: Highlights Through the Person Centered Tech Lens from the OCR's Recent Presentation on the HIPAA Security Rule Risk Analysis Requirement Policy & Procedure and HIPAA Manual Resources: PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer.
Join host Mark Ledlow in this captivating episode, where he interviews Peter Ford, a former Army commander, and experienced negotiator within the State Department. Discover the critical role of the Overseas Security Advisory Council (OSAC) and the State Department. In this episode, they delve into navigating life's unexpected turns and leveraging networking opportunities, drawing insights from Pete's experiences and strategies in the security, business, and entertainment sectors. Pete shares invaluable advice on maximizing events, making lasting connections, and utilizing networking as a tool for career growth. This discussion unveils the art of effective networking, providing practical tips for professionals seeking to thrive amidst adversity and uncertainty.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSMaximizing Networking Events: Discover the art of networking and leveraging opportunities at professional events.Strategies for Effective Networking: Learn practical tips for making lasting connections and enhancing career prospects.Adaptability Amidst Adversity: Understand the importance of adapting to life's unexpected challenges and turning them into opportunities.Utilizing OSAC Resources: Uncover the benefits of engaging with organizations like OSAC for professional growth and development.Preparing for the Future: Explore the significance of intelligence, data analysis, and adapting to technological advancements in the security sector.QUOTES"Networking is an art and a catalyst for career growth.""Everybody's got a story, and networking is a great way to learn and share.""Adapting to adversity is a skill that leads to opportunities.""Your network is your net worth in the professional world.""Maximize OSAC opportunities—it's about engaging, learning, and contributing."Get to know more about Peter Ford:LinkedIn: https://www.linkedin.com/in/peter-ford-8b841710/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Episode: 00187 Released on November 27, 2023 Description: In this episode, Kevin Mitchell shares how he leverages technology (e.g., a drone, smartwatch, etc.) to investigate a homicide and kidnapping case (two separate analyst badge stories), and his experience working at a real-time crime center (RTCC). Kevin started his career out as an IT and Security Officer; he highlights how he transferred into a local police department position, and discusses the learning curve during the transition as he received his degree in criminal justice after securing a law enforcement analyst role. Kevin is currently an IT Specialist and Criminal Analyst for the Oxford (AL) Police Department. CHALLENGE: There are Easter eggs in one of the tables of the Excel chapter that Jason wrote for the IACA textbook. First-person to email us at leapodcasts@gmail.com about what the Easter eggs are will receive a $50 gift card from us. Happy hunting! Name Drops: Chief Bill Partridge (00:01:32) Public Service Announcements: Related Links: https://www.oxfordal.gov/departments/police-department https://www.fusus.com/ https://findersoftware.com/finder/ https://www.southernsoftware.com/ https://www.briefcam.com/ https://www.wbrc.com/2022/07/05/calhoun-county-missing-woman-found-suspect-identified/ https://www.firstnet.gov/episode-66-oxford-police-leverages-compact-rapid-deployable-boost-emergency-comms-alabama Association(s) Mentioned: Vendor(s) Mentioned: FUSUS, Finder, Southern Software, BriefCam Contact: https://www.linkedin.com/in/kevin-mitchell-a9516673/ Transcript: https://mcdn.podbean.com/mf/web/k8zt42/KevinMitchell_transcript.pdf Podcast Writer: Mindy Duong Podcast Researcher: Theme Song: Written and Recorded by The Rough & Tumble. Find more of their music at www.theroughandtumble.com. Logo: Designed by Kyle McMullen. Please visit www.moderntype.com for any printable business forms and planners. Podcast Email: leapodcasts@gmail.com Podcast Webpage: www.leapodcasts.com Podcast Twitter: @leapodcasts 00:00:17 – Introducing Kevin 00:11:06 – Improving IT 00:19:47 – IT to Analyst 00:34:18 – ABS: Drone & Barricaded Suspect 00:44:40 – ABS: Cameras & Kidnapping 00:57:46 – ABS: LPR & Bank Robbery 01:03:44 – Change Jason's Mind About IT (FIT) 01:15:21 – Advice 01:24:16 – Words to the World
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're diving into Business Associate Agreements (BAAs) for group practice owners. We discuss what a BAA is; who is considered a business associate; how to execute and enforce a BAA; documenting BAAs; evaluating if a BAA is sufficient; why a HIPAA statement is not a replacement for a BAA; precedent for enforcement action from the Office of Civil Rights; and what qualifies under the conduit exception. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources HHS Model Business Associate Agreement HHS SAMPLE BUSINESS ASSOCIATE AGREEMENT PROVISIONS PCT Resources PCT article: What Is a HIPAA Business Associate? PCT free CE course: Introduction to HIPAA Security for Group Practice Leaders PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer. Group Practice Care Premium for weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces(for *all* team members at no per-person cost) + more
Join Mark Ledlow in an insightful conversation with Peter Ford, a former Army commander, and experienced negotiator within the State Department. Discover the critical role of the Overseas Security Advisory Council (OSAC) and the State Department in addressing current global security challenges. Gain valuable insights into the real-time intelligence, coordination, and support provided by OSAC to businesses operating in high-risk areas, especially in the Middle East. Dive deep into the interconnectivity between various interest groups and embassies, understanding the significance of collaborative security efforts. Delve into Pete's extensive experience, from his military service to his role in diplomatic security, and learn about his perspectives on the evolution of security measures in the diplomatic landscape.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSRole of OSAC & State Department: Learn about the pivotal role OSAC plays in providing real-time intelligence and security support to businesses operating in high-risk areas, facilitated by the State Department.Collaborative Security Efforts: Understand the significance of collective efforts among various interest groups and embassies to share security insights and support in high-risk regions.Diplomatic Landscape: Explore Pete's extensive experience in the military and diplomatic security, shedding light on the evolving security measures and the challenges faced in different global regions.OSAC Annual Meeting: Gain insights into the significance of the OSAC annual meeting as a pivotal event, facilitating networking, information exchange, and building connections across various interest groups.QUOTES"It's not an ocean anymore; it's a small pond. We deal with everything overseas." - Pete Ford"The world's so exciting when you get out there and see it." - Pete Ford"You've got to treat everybody equally; when they go overseas, make them feel like they're right up there with the big boys." - Pete Ford"If you have a company functioning in a different country, OSAC has the liaison right to the embassy, providing essential on-ground insights." - Mark LedlowGet to know more about Peter Ford:LinkedIn: https://www.linkedin.com/in/peter-ford-8b841710/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're sharing why risk analysis is essential for mental health providers, inspired by a recent webinar from the Office of Civil Rights (OCR). We discuss the core mandate of the HIPAA Security Rule; how risk analysis is essential to safeguarding PHI; conceptualizing the lifecycle of PHI in your practice; how often to do a risk analysis; written policy vs. implemented policy; security measures degrading over time; and HIPAA as a useful tool for client care. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources PCT's HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. Will identify both your 'in-practice' risks and your 'formal compliance' (what required written P&Ps are implemented) needs, while also documenting all the good things your practice is already doing! PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer. Group Practice Care Premium for weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces(for *all* team members at no per-person cost) + more
Leading an insider threat program at a Fortune 100 company takes a certain skill set that can't be molded into a single program or training certification. It takes a combination of capabilities and motivations to detect risk in some of the most challenging, unassuming places.Dave Holder is a senior analyst with Ford Motor Company where he helps lead their insider risk program. He is a decorated former counterintelligence officer with expertise in national security investigations and operations, as well as corporate workforce investigations. His national-level awards include the National Counterintelligence Executive's Investigative Team Award in 2014 and the Department of Defense Counterintelligence Team Award in 2009.Key topics of Holder's discussion with host Fred Burton include:How his experience as a Security Officer in the National Security Investigations Program of the US Army shaped him into the leader he is today. The most important skills needed to stand up an insider threat unit and the critical importance of understanding the importance of the human mind amid technological advancements (employees must feel empowered to report behaviors!)How technology has impacted the insider threat space and resources Holder recommends for those interested in exploring a career in this area. Here are the ones mentioned within the episode:Borderless Behavior Analytics - Second Edition: Who's Inside? What're They Doing?Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't IgnoreOffice of the Director of National Intelligence's National Insider Threat TaskforceKey takeaways:01:23: Dave Holder: There are a lot of things in the military that carry directly over. Most of us coming out of these types of environments struggle with that balance a little bit. And with leadership, generally speaking, I learned you can't leave from behind. You have to be good at what you do as a practitioner. Have to be good with your people you've got to empower everyone and let them lead and innovate.14:00: Dave Holder: When I think about the horizon I guess I could think about it in terms of where I think the enemy threat picture is going to use military terminology — defensively, I have to react to what the adversary is doing, but offensively, can I create a framework that puts all of the odds in my favor. On the program-building side of things, I think we need to put more focus into that and hopefully, some of the work MITRE is doing to build out an insider threat framework similar to MITRE attack for cyber defense will produce some of the applied research findings that will help us to get ahead of the curve. In the meantime, we have to continue to professionalize this field that we're calling Insider threat or insider risk along the main core competencies. I think without those we're not fluent enough with compliance professionals, privacy professionals, offices of general counsel, etc. We have to be able to converse with them in terms they ah that they understand and that they care about.
The Smithsonian Institution was founded on principles of reason and scientific inquiry. So why is the Smithsonian home to countless tales of unexplained phenomena and—dare we say—ghost sightings? Inspired by an apparition at the National Museum of American History, we creak across museum attic floorboards, sneak into an old house in the woods, and even travel back in time to bring you a collection of spooky stories that can only be found at the Smithsonian. Guests: Molly Horrocks, Collections Manager, Division of Political and Military History at the Smithsonian's National Museum of American History Pamela Henson, Institutional Historian at the Smithsonian Libraries and Archives Cpl. Ronald Howlin, Security Officer at the Smithsonian Environmental Research Center Deborah Hull-Walski, Collections Manager, Education Collections at the Smithsonian's National Museum of Natural History Melissa Johnson, daughter of Deb Hull-Walski and former skeptical teenager Kim Dixon, former volunteer at the Smithsonian's National Zoo
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we talk about what policies and procedures you need in group practice. We discuss why this process is confusing; the difference between a HIPAA clause in an employment contract and specific security policies and procedures; why having policies is helpful (and pitfalls when policies aren't in place); our customizable templates to help you develop HIPAA security policies and procedures for your practice; the importance of practical application; and taking your time with implementation. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive customizable HIPAA Security Policies & Procedure and materials templates specifically for mental health group practices. with a detailed step-by-step project plan and guided instructions for adopting & implementing efficiently Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog + Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures + 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer. Group Practice Care Premium for weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces(for *all* team members at no per-person cost) + more PCT's HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. Will identify both your 'in-practice' risks and your 'formal compliance' (what required written P&Ps are implemented) needs, while also documenting all the good things your practice is already doing!
Tully's Monsters chase after Wendy McDonald. Beaufort Gubbins pretends to be a robot. Cecilia teaches the new Security Officer the ropes. Max Ina shifts their hoverbike into Opa Opa mode. Trizzy gets a phone call from an ex. STARRING - Austin Yorski: @AustinYorski Laura Kate Dale: @LauraKBuzz Michael "Skitch" Schiciano: @SkitchMusic Quinn Larios: @RolloT SUPPORT - Patreon.com/AustinYorski Patreon.com/LauraKBuzz Patreon.com/Skitch Patreon.com/WeeklyMangaRecap ART, AUDIO, & MUSIC - 3 AM ▸ Animal Crossing ~ Curly Remix: https://youtu.be/vVEfKS5hlnU "32 Ghosts IV" by Nine Inch Nails licensed under a Creative Commons Attribution-Noncommercial-Share Alike license "34 Ghosts IV" by Nine Inch Nails licensed under a Creative Commons Attribution-Noncommercial-Share Alike license "Cold Feet" by Rachel Hillman: RachelHillmanMusic.com God of War OC ReMix by Aesaire: "War Never Changes" [God of War] (#4140) - YouTube Title Card: @eyrphyre Zelda & Chill - Dark World - YouTube DISCORD - https://discord.gg/YMU3qUH