- An update from Mac McMillan, CEO & President of CynergisTek. Mac will introduce our speakers for this session and highlight why their topics matter.
- What does it really take to implement technology solutions successfully? Sure you can easily purchase EDR/MFR technologies, but what happens after you purchase the technology? Dave Bailey will highlight what is important for you to know before you buy a technology solution, and what it takes to implement it successfully.
- Updates to the 21st Century Cures Act. As we move towards the new compliance date of October 6, 2022, Andrew Mahler will highlight what you should start thinking about and doing now that the definition of health information is no longer limited and has expanded to include all Electronic Health Information. Andrew will also review the challenges and considerations to confront as we inch towards October.
Other content in this Stream
April topics include current threats, current challenges surrounding patients' Right of Access, and the speed ransomware encrypts your files from CynergisTek thought leaders.
March 2022 Cyber Briefing hosted by Mac McMillan. Mac discusses threat actors and other key topics & trending news related to healthcare privacy, cybersecurity, IT audit, & compliance.
Mac McMillan discusses healthcare providers and their need to devote more resources to preventing cybersecurity attacks.
Mac McMillan, CEO of CynergisTek discusses cybersecurity attacks and breaches of the past few months as pointing up a key lesson for health system leaders.
Understand are the basic cyber hygiene practices that can drastically reduce your risk of being taken down by ransomware.
Adversary Validation discovers vulnerabilities with no disruption to network operations and allows your organization to remediate before the malicious hacker can exploit your environment.
This checklist explains the five important factors that will help you navigate through your staffing consideration. Read more today.
CynergisTek's second annual report analyzed the results of assessments at hundreds of healthcare organizations against NIST CSF and the HIPAA Privacy and Security Rules.
Read our checklist to learn criteria every healthcare delivery organization should consider when evaluating their medical device security program to effectively mitigate risks.
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
This checklist describes the top vulnerabilities we have found in healthcare organizations along with the action items that should be taken to address them.
CynergisTek's Founder and CEO Mac McMillan is a defense intelligence veteran. Its Vice President of Cybersecurity Strategy, John Nye, served in the Army. At HIMSS 2018, the two told Healthcare Analyti
CynergisTek’s experts fulfill short- and long-term security and privacy roles to help healthcare organizations remediate, develop, and implement programs and technology.
Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations across the nation to reveal an average 45 percent conformance with NIST CSF.
The 7th Annual Breach Report examines breaches of PHI that occurred throughout 2016, the current state of cybersecurity and recommendations for strengthening privacy and security in healthcare.
Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.
Use this checklist to ensure you have the required supporting documentation for the Meaningful Use Audit.
Use this checklist to determine if your policies, procedures, and on-going print security maintenance are vulnerable to threats.
While at AHIMA 2016, Healthcare Scene talked with Mac McMillan, CEO and Co-Founder of CynergisTek, about the role of HIM in healthcare privacy and security. We also asked Mac about privacy and securi
Mac McMillan interview with HealthITSecurity is quoted discussing the new year, ransomware operators will shift their focus away from encryption and on to data exfiltration.