News & Analysis as of

Risk Management Information Security Health Insurance Portability and Accountability Act (HIPAA)

Gardner Law

Why Every Manufacturer Needs a Robust Information Security Program

Gardner Law on

Drug and device manufacturers are increasingly targeted by cyber threats that can compromise patient safety, intellectual property, and other critical data and systems, while also facing new regulatory demands. As regulators...more

Society of Corporate Compliance and Ethics...

[Webinar] Security Compliance at Scale - December 13th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Learn the technical dos and don’ts in implementing security compliance frameworks such as SOC 2, ISO 27001 and HIPAA - Discussion about why security compliance is so critical for organizations...more

NAVEX

4 Ways to Protect ePHI Beyond HIPAA Compliance

NAVEX on

Given the choice between credit card data and digital health records, cybercriminals prefer the latter. A stolen credit card can be canceled. Electronic protected health information (ePHI) with its treasure-trove of...more

Harris Beach Murtha PLLC

The Importance of Information Security Plans

In the first installation of our weekly series during National Cybersecurity Awareness Month, we examine information security plans (ISP) as part of an overall cybersecurity strategy. Regardless of the size or function of an...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide