Youtube - Webinars

  • Assessing Medical Device and IoT Security  4 Questions You Should Ask Yourself54:11

    Assessing Medical Device and IoT Security 4 Questions You Should Ask Yourself

    The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed bed – many of those are networked

    Watch Video
  • Investigating and Assessing Incidents Reported by a Vendor1:01:23

    Investigating and Assessing Incidents Reported by a Vendor

    What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially breached your patients’ sens

    Watch Video
  • Stay Up to Date with Our Latest Videos!

    Follow on YouTube
  • 3rd Annual Cybersecurity Virtual Panel Discussion1:00:30

    3rd Annual Cybersecurity Virtual Panel Discussion

    Note: This event is best viewed in full screen mode. On this virtual panel discussion industry leaders discuss and share their thoughts and insights on the impact of cybersecurity on healthcare organ

    Watch Video
  • How Ready Are We for a Cyber Event?1:03:54

    How Ready Are We for a Cyber Event?

    David Finn, EVP of Strategic Innovation of CynergisTek, provides an overview of the findings in our annual report, “Improving Readiness: Meeting Cyber Threats.” Our report seeks to explain healthcare

    Watch Video
  • Do you know who is accessing your organization's medical records?1:01:14

    Do you know who is accessing your organization's medical records?

    Be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program. Insider snooping continues to be a huge threat to the security of patient information, a

    Watch Video
  • Cybersecurity Is Everyone's Business in the Workplace55:50

    Cybersecurity Is Everyone's Business in the Workplace

    John Nye, expert penetration tester and CynergisTek's VP of Cybersecurity Strategy, presents a webinar on how IT users can reduce their cybersecurity vulnerabilities. After watching this session, you

    Watch Video
  • Securing Forgotten Devices in the Hospital50:48

    Securing Forgotten Devices in the Hospital

    Presented by Sean Hughes, EVP of Document Solutions at CynergisTek This webinar will analyze how sensitive information is created, stored, and printed on many types of devices managed outside of a tr

    Watch Video
  • Don't Get Hooked by a Phish56:00

    Don't Get Hooked by a Phish

    Watch this webinar to identify the risks posed to healthcare organizations by phishing attacks and learn proven strategies for mitigating that risk.

    Watch Video
  • Protecting Your Healthcare Organization from Cyber Attacks1:02:11

    Protecting Your Healthcare Organization from Cyber Attacks

    In this informative webinar, nationally recognized privacy and security expert Mac McMillan, co-founder and CEO of CynergisTek, will use real-world examples to examine some of the most pressing securi

    Watch Video
  • Cybersecurity and Healthcare: A Panel Discussion with Industry Thought Leaders1:16:37

    Cybersecurity and Healthcare: A Panel Discussion with Industry Thought Leaders

    On this webcast industry leaders discuss and share their thoughts on the impact of cybersecurity on healthcare organizations. The panel discussion was moderated by Matt Fisher, Esq. an associate with

    Watch Video
  • Business Associate Requirements & How to Achieve Regulatory Compliance59:00

    Business Associate Requirements & How to Achieve Regulatory Compliance

    David Holtzman, VP of compliance at CynergisTek and former advisor at OCR identifies what healthcare vendors are considered business associates and what are business associates HIPAA compliance requi

    Watch Video
  • How to Prepare for a Meaningful Use Audit56:13

    How to Prepare for a Meaningful Use Audit

    David Holtzman, VP of Compliance of CynergisTek, presents the Meaningful Use requirements, breaks down the audit process and provides guidance on how organizations can prepare for a CMS Meaningful Use

    Watch Video
  • Covered Entities Should Periodically Audit Third Party Vendors/Business Associates1:02:19

    Covered Entities Should Periodically Audit Third Party Vendors/Business Associates

    Covered Entities Should Periodically Audit Third Party Vendors/Business Associates -- Why, What, & How?

    Watch Video
  • Vendor Security Management After the Omnibus Rule1:14:43

    Vendor Security Management After the Omnibus Rule

    The Omnibus Rule caused many changes in the relationships between covered entities and business associates and now it is more important than ever that they are working together to protect sensitive PH

    Watch Video
  • loading
    Loading More...