Webinar Recordings

View webinars from CynergisTek's team of experts on topics including healthcare security, privacy, compliance, and managed print.

  • Facebook, APIs, and GDPR, Oh My!58:59

    Facebook, APIs, and GDPR, Oh My!

    Right now, healthcare privacy professionals are faced with an unending stream of news from other industries, from their technology teams, and regulatory actions, much of which seems like it could be r

    Watch Video
  • How to Close Medical Device Security Gaps1:01:14

    How to Close Medical Device Security Gaps

    In this webinar, Clyde Hewitt & Cory Blacketer discussed the current state of privacy & security risks posed by medical devices and the challenges associated with them.

    Watch Video
  • Missed a Previous Webinar? No Problem! Stay Up to Date with Our Latest Webinar Video Recordings!

    Follow on YouTube
  • Addressing the Cybersecurity Workforce Shortage Webinar1:00:54

    Addressing the Cybersecurity Workforce Shortage Webinar

    The increased need for cybersecurity professionals continues to grow worldwide and it is predicted that the global workforce will have more than 1.8M unfilled cybersecurity positions by 2022. What are

    Watch Video
  • Measuring Progress Expanding the Horizon1:01:38

    Measuring Progress Expanding the Horizon

    David Finn, EVP of Strategic Innovation of CynergisTek and Michael Vida, Manager of Security Services discuss an analysis of CynergisTek’s annual report in this webinar. It also addresses some of the

    Watch Video
  • Healthcare Privacy & Cybersecurity: Outlook for 20191:00:18

    Healthcare Privacy & Cybersecurity: Outlook for 2019

    During this webinar, John Nye and David Holtzman discussed the emerging privacy and security issues they predicted to trend in the healthcare industry and how organizations should be preparing. Some o

    Watch Video
  • Medical Devices: The Risks Go Beyond Security1:01:30

    Medical Devices: The Risks Go Beyond Security

    Watch our latest webinar on medical device security hosted by David Finn, EVP of Strategic Innovation at CynergisTek, Cory Blacketer, Information Security Consultant – Medical Device Security at Cyner

    Watch Video
  • Endpoint Device Security: Addressing the Hidden and Neglected Endpoints54:11

    Endpoint Device Security: Addressing the Hidden and Neglected Endpoints

    The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked

    Watch Video
  • Investigating and Assessing Incidents Reported by a Vendor1:01:23

    Investigating and Assessing Incidents Reported by a Vendor

    In this webinar, David Holtzman describes the actions to take if your business associate compromises your patients’ info, even if your agreement says that the BA will handle the breach notification.

    Watch Video
  • 3rd Annual Cybersecurity Virtual Panel Discussion1:00:30

    3rd Annual Cybersecurity Virtual Panel Discussion

    On this virtual panel, discussion industry leaders discuss and share their thoughts and insights on the impact of cybersecurity on healthcare organizations.

    Watch Video
  • How Ready Are We for a Cyber Event?1:03:54

    How Ready Are We for a Cyber Event?

    In this Webinar, David Finn, EVP of Strategic Innovation of CynergisTek, provides an overview of the findings in our annual report, “Improving Readiness: Meeting Cyber Threats.”

    Watch Video
  • Do you know who is accessing your organization's medical records?1:01:14

    Do you know who is accessing your organization's medical records?

    This webinar helps you be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program.

    Watch Video
  • Cybersecurity Is Everyone's Business in the Workplace55:50

    Cybersecurity Is Everyone's Business in the Workplace

    John Nye, expert penetration tester and CynergisTek's VP of Cybersecurity Strategy, presents a webinar on how IT users can reduce their cybersecurity vulnerabilities.

    Watch Video
  • Don't Get Hooked by a Phish56:00

    Don't Get Hooked by a Phish

    Watch this webinar to identify the risks posed to healthcare organizations by phishing attacks and learn proven strategies for mitigating that risk.

    Watch Video
  • Protecting Your Healthcare Organization from Cyber Attacks1:02:11

    Protecting Your Healthcare Organization from Cyber Attacks

    In this informative webinar, expert Mac McMillan will use real-world examples to examine some of the most pressing security concerns that exist in healthcare today.

    Watch Video
  • Cybersecurity and Healthcare: A Panel Discussion with Industry Thought Leaders1:16:37

    Cybersecurity and Healthcare: A Panel Discussion with Industry Thought Leaders

    On this webcast industry leaders discuss and share their thoughts on the impact of cybersecurity on healthcare organizations. Moderated by Matt Fisher, Esq. an associate with Mirick O’Connell.

    Watch Video
  • Business Associate Requirements & How to Achieve Regulatory Compliance59:00

    Business Associate Requirements & How to Achieve Regulatory Compliance

    David Holtzman identifies what healthcare vendors are considered business associates and what are business associates HIPAA compliance requirements in this webinar.

    Watch Video
  • How to Prepare for a Meaningful Use Audit56:13

    How to Prepare for a Meaningful Use Audit

    David Holtzman presents the Meaningful Use requirements, breaks down the audit process, and provides guidance on how organizations can prepare for a CMS meaningful use audit.

    Watch Video
  • Covered Entities Should Periodically Audit Third Party Vendors/Business Associates1:02:19

    Covered Entities Should Periodically Audit Third Party Vendors/Business Associates

    In this webinar we discuss covered Entities Should Periodically Audit Third Party Vendors/Business Associates -- Why, What, & How?

    Watch Video
  • Vendor Security Management After the Omnibus Rule1:14:43

    Vendor Security Management After the Omnibus Rule

    In this webinar, we discuss the Omnibus Rule caused many changes in the relationships between covered entities and business associates and now they are working together to protect sensitive PHI.

    Watch Video
  • loading
    Loading More...