Podcasts about security risk analysis

  • 15PODCASTS
  • 22EPISODES
  • 27mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 24, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about security risk analysis

Latest podcast episodes about security risk analysis

The Medcurity Podcast: Security | Compliance | Technology | Healthcare
2025 HIPAA Essentials in 5 Minutes | Medcurity Live 090

The Medcurity Podcast: Security | Compliance | Technology | Healthcare

Play Episode Listen Later Apr 24, 2025 5:28


In five minutes, we break down what HIPAA really expects from your organization in 2025.From your Security Risk Analysis to employee training, access controls, audit logs, and business associate agreements—this is the real-world checklist regulators are looking for. We'll explain each core requirement, how enforcement is evolving, and offer practical tips to keep your compliance efforts focused and manageable.Learn more about Medcurity here: https://medcurity.com#Healthcare #Cybersecurity #Compliance #HIPAA 

essentials hipaa security risk analysis
The Medcurity Podcast: Security | Compliance | Technology | Healthcare
Why Now's the Time to Get Your Security Risk Analysis Done | Medcurity Live 070

The Medcurity Podcast: Security | Compliance | Technology | Healthcare

Play Episode Listen Later Nov 13, 2024 6:03


With the end of the year approaching, now's the time to take a close look at any potential vulnerabilities within your organization. An annual Security Risk Analysis demonstrates your commitment to data and system protection, while also reassuring customers and meeting compliance standards.  Tune in to the latest episode of The Medcurity Podcast to learn more about why now is the time to complete your SRA. Need assistance with this task? Reach out to our team here: https://medcurity.com/contact-us/ #Healthcare #Cybersecurity #Compliance #HIPAA #SecurityRiskAnalysis

reach sra security risk analysis
The Bid Picture - Cybersecurity & Intelligence Analysis

Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Joe Gellatly, the CEO and Co-Founder of Medcurity, a Security Risk Management company based in Spokane, Washington. Medcurity helps healthcare organizations gain clarity and confidence in their cybersecurity and compliance programs. The Medcurity team is trusted by hospitals and clinics across the United States to conduct their HIPAA-required Security Risk Analysis annually, utilizing a proprietary, AI-powered platform.Support the Show.

The Medcurity Podcast: Security | Compliance | Technology | Healthcare
Why Should Every Healthcare Organization Be Prioritizing Security Risk Analyses? | Medcurity Live 054

The Medcurity Podcast: Security | Compliance | Technology | Healthcare

Play Episode Listen Later Jun 26, 2024 5:16


What is a Security Risk Analysis, why is it important, and how should you effectively conduct one? We address all of these questions in our latest episode of The Medcurity Podcast.  Learn more about Medcurity here: https://medcurity.com

Help Me With HIPAA
7 Crucial Steps to a Comprehensive SRA - Ep 462

Help Me With HIPAA

Play Episode Listen Later Jun 14, 2024 61:29


Join us as we debunked some common myths about what Security Risk Analysis isn't and then cruise through the seven essential steps to conduct a complete and thorough SRA for any organization. It's not just a one-off IT review or a checkbox on compliance forms—it's an ongoing, dynamic process. From identifying what you need to protect to managing how you protect it, each step builds on the last to fortify your defense against the digital wild west.  More info at HelpMeWithHIPAA.com/462

comprehensive sra crucial steps security risk analysis
Coffee with Coker
Episode 105: Why do I need cyber liability insurance?

Coffee with Coker

Play Episode Listen Later Aug 11, 2022 36:27


Jeffery Daigrepont interviews Dan Stewart, the president of Jackson Health Tech Advisors, one of our partners providing cybersecurity advisory services. Dan has been in the healthcare information technology and services industry for more than 30 years, with the last ten years focused on cybersecurity risk management and mitigation services. That includes a Cyber Liability Insurance Services program we will discuss today.   Podcast Information  Follow our feed in Apple Podcasts, Google Podcasts, Spotify, Audible, or your preferred podcast provider. Like what you hear? Leave a review! We welcome all feedback from our listeners. Email us questions on any of the topics we discuss or questions about issues that interest you. You can also provide recommendations on matters for future episodes.  Please email us: feedback@cokergroup.com Connect with us on LinkedIn: Coker Group Company Page Follow us on Twitter: @cokergroup Follow us on Instagram: @cokergroup Follow us on Facebook: @cokerconsulting   Episode Synopsis  The last two years have seen a new era of cyber-attacks with increased hacker sophistication, a propensity to pay in ransomware cases, and a geopolitical environment that has upended the cyber insurance market in general, particularly in healthcare. In 2020, healthcare-related cyber-attacks increased by more than 55%, of which ransomware attacks comprised 28% of the total. According to Cybersecurity Ventures, in 2021, the US healthcare system lost $21 billion caused by ransomware attacks alone. Covid-19 further exposed the weaknesses in healthcare cybersecurity systems as the industry was forced to institute or expand telehealth services and remote working functions rapidly. These factors caused significant losses for the insurance carriers that were providing cyber insurance resulting in several major market changes that are affecting healthcare providers.   Extras Key Elements of a Cyber Liability Insurance Policy for Healthcare Providers Cybersecurity Tips Episode 57: HCIT: Security Risk Assessment Episode 103: What is a Security Risk Analysis, and Why Do I Need One? Contact Jeffery Daigrepont

Coffee with Coker
Episode 103: What is a Security Risk Analysis, and Why Do I Need One?

Coffee with Coker

Play Episode Listen Later Jun 30, 2022 33:42


DeAnn Tucker and Roz Cordini join Mark Reiboldt to explain the need for a security risk analysis within healthcare organizations. Many organizations are missing one critical component when performing a security risk analysis. Learn what elements organizations usually miss and how to conduct a security risk analysis properly.   Podcast Information Follow our feed in Apple Podcasts, Google Podcasts, Spotify, Audible, or your preferred podcast provider. Like what you hear? Leave a review! We welcome all feedback from our listeners. Email us questions on any of the topics we discuss or questions about issues that interest you. You can also provide recommendations on matters for future episodes.  Please email us: feedback@cokergroup.com Connect with us on LinkedIn: Coker Group Company Page Follow us on Twitter: @cokergroup Follow us on Instagram: @cokergroup Follow us on Facebook: @cokerconsulting   Episode Synopsis Did you know Health and Human Services requires an annual security risk analysis? If a breach of information occurs, OCR will request the last 2-3 years of security risk analyses to verify your organization has performed the analysis and taken steps to implement the remediation plan. Aside from the requirement, performing a security risk analysis also safeguards electronic protected health information (ePHI) by identifying potential vulnerabilities before a criminal exploits them. Click to listen to the episode.   Extras Security Rule 45 CFR 164.308 Guidance on Risk Analysis Requirements under the HIPAA Security Rule 5 Mistakes Covered Entities and Business Associates Made During a Security Risk Analysis

The Medcurity Podcast: Security | Compliance | Technology | Healthcare
Security Risk Analysis Tips for Busy Practice Managers | Medcurity Live 037

The Medcurity Podcast: Security | Compliance | Technology | Healthcare

Play Episode Listen Later Jul 7, 2021 29:24


Alexa speaks with Ari Van Peursem, the National Partner Manager at Medcurity on some practical strategies for an efficient, budget-friendly security risk analysis. Hear the top three biggest time wasters that are occurring when practices conduct SRAs, and get recommendations for practice managers to simplify the SRA process.

busy sra practice managers sras security risk analysis
Caffeinated Risk
Security risk analysis using attack trees with Terry Ingoldsby

Caffeinated Risk

Play Episode Play 50 sec Highlight Listen Later May 19, 2021 34:42


"We need more science in Cyber Security"  David Hechler, TAG Cyber Law Journal Threat modeling should be step 0 of any security architecture but often goes completely unconsidered. This episode features Terry Ingoldsby, a veteran cyber risk professional, physicist, computer scientist and inventor of Securitree. Ingoldsby created the attack tree development platform because he felt cyber security assessments should be defendable rather than just the educated opinion of assessor.Despite being the inventor, there is no sales pitch. Terry, Tim and Doug talk risk, engineering, business cases and why there is no AI magic when it comes to identifying events that could end your organization. 

ai attack trees cybersecurity security risk analysis
Compliance Solved
Episode 5: Security Risk Analysis - A Proactive Approach

Compliance Solved

Play Episode Listen Later Nov 12, 2020 16:37


Every day healthcare organizations are being slapped with fines and court rulings for something that is so avoidable. In this episode we discuss the Security Risk Analysis and common trends that we have seen. We offer tips and advice on how to conduct a thorough and accurate SRA, and what you can do to reduce your risk of exposure.

proactive sra security risk analysis
The Darkhorse Dental Success Podcast
Episode 11 - Abyde HIPAA Compliance with Chris Wheaton

The Darkhorse Dental Success Podcast

Play Episode Listen Later Oct 8, 2020 16:21


In the latest Podcast, we bring on HIPAA Expert and Industry Leader Chris Wheaton from Abyde.   The Abyde software solution is the easiest way for any sized dental practice to implement and sustain comprehensive HIPAA compliance programs. Abyde’s revolutionary approach guides dentists through mandatory HIPAA compliance requirements such as the Security Risk Analysis, HIPAA training for doctors and staff, Business Associate Agreement portal, customized policy documentation, and more!   Use Promo code Darkhorse10 to receive 10% off your Abyde subscription.

hipaa wheaton hipaa compliance business associate agreement security risk analysis
S-RM Insider
Geopolitical Risks to Businesses and their Supply Chains during the COVID-19 pandemic

S-RM Insider

Play Episode Listen Later Apr 21, 2020 11:11


S-RM's Lenoy Barkai speaks with our Head of Political and Security Risk Analysis, Cvete Koneska, on why organisations should take geopolitical risks seriously in the midst of a global pandemic. Read the article: https://insights.s-rminform.com/global-pandemic-geopolitical-risk

Health Professional Radio - Podcast 454422
CareVitality to Improve Patient Outcomes

Health Professional Radio - Podcast 454422

Play Episode Listen Later Mar 25, 2019 15:27


Vanessa Bisceglie discusses the many services offered to healthcare providers by CareVitality, a subsidiary of EHR & Practice Management Consultants, Inc. Vanessa is highly specialized in Cybersecurity, Care Management, Ambulatory Healthcare IT and MACRA/ Quality Payment Program which has two pathways: MIPS and APM where she guides her team of consultants and care managers to assist providers in their transition to value-based care and performs Security Risk Analysis for over 100+ clients in the last 10 years. These are all the main focus areas of CareVitality. She founded CareVitality to help providers transform their practices by optimizing their existing technology and provides additional care teams to improve patient outcomes and generate additional revenue to their practice while staying focused what truly matters to providers which is providing patient care. CareVitality continues to offer cybersecurity support many of their clients nationally as well. Visit www.hpr.fm to listen to more podcast episodes about health.

Government Information Security Podcast
Avoiding Critical Security Risk Analysis Mistakes

Government Information Security Podcast

Play Episode Listen Later Jan 16, 2019


mistakes security risk analysis
Info Risk Today Podcast
Avoiding Critical Security Risk Analysis Mistakes

Info Risk Today Podcast

Play Episode Listen Later Jan 16, 2019


mistakes security risk analysis
Careers Information Security Podcast
Avoiding Critical Security Risk Analysis Mistakes

Careers Information Security Podcast

Play Episode Listen Later Jan 16, 2019


mistakes security risk analysis
Data Breach Today Podcast
Avoiding Critical Security Risk Analysis Mistakes

Data Breach Today Podcast

Play Episode Listen Later Jan 16, 2019


mistakes security risk analysis
Healthcare Information Security Podcast
Avoiding Critical Security Risk Analysis Mistakes

Healthcare Information Security Podcast

Play Episode Listen Later Jan 16, 2019


mistakes security risk analysis
Help Me With HIPAA
Risk OR Gap Analysis THAT Is The Question - Ep 154

Help Me With HIPAA

Play Episode Listen Later May 17, 2018 46:54


There is a frequent issue with people understanding what a Security Risk Analysis includes. In fact, there is so much confusion we often see documents presented as a risk analysis that is actually a gap analysis. It happens so often that OCR is trying to address it in their April newsletter. We are going to take a stab at explaining what gap analysis reports look like vs what a security risk analysis report really includes when done properly. For more information: HelpMeWithHIPAA.com/154

Startup Grind
Make the Best Product You Can Make with The Tuft & Needle Founders

Startup Grind

Play Episode Listen Later Jan 4, 2016 44:30


Daehee Park & JT Marino. The two founded Tuft & Needle with the idea that it is possible to create high quality products and charge a fair price to customers.  Launched in 2012 by two software engineers, Tuft & Needle was the first vertically integrated ecommerce mattress company to focus on selling one perfect product: an unbeatable mattress at an unbeatable price. With a background in ecommerce and marketing, prior to Tuft & Needle Daehee Park served as a consultant at Acxiom Corporation. Daehee received his bachelor’s degree in Security & Risk Analysis at Penn State University. John-Thomas (“JT”) Marino leads product and software development. With a passion for thoughtfully designed customer experiences, JT started his career at Hashrocket helping startups build just that. With roots in Northeastern Pennsylvania, JT studied Computer Science at Penn State University.   Startup Grind is Brought to You By:    Soylent: Easy, sustained energy that goes where you go. Learn more at Soylent.com

Help Me With HIPAA
Episode 10: ONC Sample Seven-Step Approach for Implementing a Security Management Process

Help Me With HIPAA

Play Episode Listen Later Jul 17, 2015 32:18


ONC recently published an updated guide for Privacy and Security of Electronic Health Information.  This episode David and Donna discuss what that guide calls the Seven-Step Approach for Implementing a Security Management Process. Links Guide to Privacy and Security of Electronic Health Information FindHealthcareIT HIPAAforMSPS.com Kardon Compliance Notes The 7 Steps Step 1: Lead Your Culture, Select Your Team, and Learn Assign your officers, make sure they are trained, show compliance is a top down commitment Step 2: Document Your Process, Findings, and Actions If you can't prove it then it didn't happen. Document your decisions, plans and activity Step 3: Review Existing Security of ePHI (Perform Security Risk Analysis) Review or perform your Security Risk Analysis and current security assessment Step 4: Develop an Action Plan The plan needs to address all the things you identified in your assessments, policies, and procedures Step 5: Manage and Mitigate Risks This is where your project management skills come into play making sure you have addressed all the risks in your Analysis and new ones aren't showing up Step 6: Attest for Meaningful Use Security­Related Objective If you are attesting make sure you have done the previous steps Step 7: Monitor, Audit, and Update Security on an Ongoing Basis Remember it isn't a project that has a beginning and ending date 

Help Me With HIPAA
Episode 7: HIPAA Myths Part 1

Help Me With HIPAA

Play Episode Listen Later Jun 26, 2015 23:25


  we discuss some common myths (or points of confusion) surrounding HIPAA compliance requirements. Glossary Myth is a widely held but false belief or idea. Links HealthIT.gov Top 10 Myths of Security Risk AnalysisHealthIT.gov Guide to Privacy and Security of Electronic Health Information Analysis Notes Providers are not allowed to share information about a patient with others unless authorized by the patient to do so. False. Providers can share: With anyone the patient identifies as a caregiver When the information is directly relevant to the involvement of spouse, family member, friends, or caregivers. (Ebola for example) When necessary to notify a caregiver about a change in condition or location of a patient (as long as the patient doesn't object) When in the best interest of the patient regardless of their ability to object or not The security risk analysis is optional for small providers and business associates. False. Everyone is required to abide by the Security Rule which specifically requires a security risk analysis. A checklist will suffice for the risk analysis requirement. False.Checklists are tools for doing the analysis and gathering your data but they aren't enough to meet the risk analysis requirement. A Security Risk Analysis must include three main elements (according to OCR guidance): A. Identification of all PHI sourcesB. Human, electronic and environmental threats to the PHIC. Review of current security measures to protect the PHI from those