Youtube - Webinars
Do you know who is accessing your organization's medical records?
Be prepared to get out the checkbook if you don’t have a robust, proactive patient privacy monitoring program. Insider snooping continues to be a huge threat to the security of patient information, a
Cybersecurity Is Everyone's Business in the Workplace
John Nye, expert penetration tester and CynergisTek's VP of Cybersecurity Strategy, presents a webinar on how IT users can reduce their cybersecurity vulnerabilities. After watching this session, you
Stay Up to Date with Our Latest Videos!Follow on YouTube
Securing Forgotten Devices in the Hospital
Presented by Sean Hughes, EVP of Document Solutions at CynergisTek This webinar will analyze how sensitive information is created, stored, and printed on many types of devices managed outside of a tr
Don't Get Hooked by a Phish
Watch this webinar to identify the risks posed to healthcare organizations by phishing attacks and learn proven strategies for mitigating that risk.
Protecting Your Healthcare Organization from Cyber Attacks
In this informative webinar, nationally recognized privacy and security expert Mac McMillan, co-founder and CEO of CynergisTek, will use real-world examples to examine some of the most pressing securi
Cybersecurity and Healthcare: A Panel Discussion with Industry Thought Leaders
On this webcast industry leaders discuss and share their thoughts on the impact of cybersecurity on healthcare organizations. The panel discussion was moderated by Matt Fisher, Esq. an associate with
Business Associate Requirements & How to Achieve Regulatory Compliance
David Holtzman, VP of compliance at CynergisTek and former advisor at OCR identifies what healthcare vendors are considered business associates and what are business associates HIPAA compliance requi
How to Prepare for a Meaningful Use Audit
David Holtzman, VP of Compliance of CynergisTek, presents the Meaningful Use requirements, breaks down the audit process and provides guidance on how organizations can prepare for a CMS Meaningful Use
ShellShock: Know the Basics, Why it is Important & Steps to Limit Exposure
Dr. Michael Mathews recently address what the ShellShock bug is, what it can mean for your security and privacy, and what you can do to limit exposure to the vulnerability.
Covered Entities Should Periodically Audit Third Party Vendors/Business Associates
Covered Entities Should Periodically Audit Third Party Vendors/Business Associates -- Why, What, & How?
Vendor Security Management After the Omnibus Rule
The Omnibus Rule caused many changes in the relationships between covered entities and business associates and now it is more important than ever that they are working together to protect sensitive PH