Logo

    hipaa compliance

    Explore " hipaa compliance" with insightful episodes like "Minimizing HIPAA Breach Penalties: Let a Technical Vendor Do Some of Your Work", "The journey of clinical trials - an interview with Matt Barthel", "161 - Prepping a Job & Removing the Fear", "Walter Isaacson, Author & Historian" and "How is Artificial Intelligence Changing Cyber Crime?" from podcasts like ""Brouse Health Care Checkup", "under CTRL", "Producers' Happy Hour", "Gridlock Break" and "No Password Required"" and more!

    Episodes (11)

    Minimizing HIPAA Breach Penalties: Let a Technical Vendor Do Some of Your Work

    Minimizing HIPAA Breach Penalties: Let a Technical Vendor Do Some of Your Work

    In this episode, James McCaulley of AtNetPlus, shares with us how a third-party technical vendor assists health care entities with their HIPAA compliance. Even if many systems are remotely hosted by third-party providers, covered entities under HIPAA are still responsible for the protected health information they generate. Last year's pandemic created a sense of urgency for many health care providers to have to scramble to obtain a telehealth platform and make other on-the-fly operational decisions. Now is the time to reconvene and ensure those processes and platforms are HIPAA-compliant.

    -------------

    James McCaulley
    Tech Development Manager - AtNetPlus 
    330.945.5685
    AtNetPlus.com
    Twitter  |  LinkedIn

    Schedule a time for us to connect here

    Nicole M. Thorn
    Attorney - Brouse McDowell, LPA
    330.434.7062
    brouse.com
    Web Bio |  LinkedIn

    Schedule a time for us to connect here

    The journey of clinical trials - an interview with Matt Barthel

    The journey of clinical trials - an interview with Matt Barthel

    How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.

    You can find todays guest on https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/ and learn more about Adamas Consulting Group on https://www.adamasconsulting.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

    161 - Prepping a Job & Removing the Fear

    161 - Prepping a Job & Removing the Fear

    In this episode: Prepping a Job & Removing the Fear

    Sister Christian describes the process of prepping a job during a pandemic and all the considerations that need to be made to keep the crew safe. From testing to HIPAA compliance to contact tracing, she's shedding some light on the vast amounts of work involved in these modern filmmaking times.

    HIPAA & Covid-19
    https://www.hhs.gov/hipaa/for-professionals/special-topics/hipaa-covid19/index.html

    Facebook watchdog rips the platform's inaction over misleading political posts.
    https://adage.com/article/news/facebook-watchdog-rips-platforms-inaction-over-misleading-trump-2020-posts/2266311

    Restarting Film Production involves Testing, Budgets and Quarantine Rules
    https://www.thewrap.com/as-pandemic-worsens-hollywood-struggles-to-salvage-reopening-plans/

    Halle Berry apologizes for conside3ring playing a transgender character, and a Facebook Group meltdown over the issue
    https://www.forbes.com/sites/elanagross/2020/07/07/halle-berry-apologizes-for-considering-playing-a-transgender-character/#d1904646962b

    Dan Harmon & Jessica Gao
    https://starburns.audio/podcasts/whiting-wongs/

    WNBA star Natasha Cloud w/Don Lemon
    https://www.youtube.com/watch?v=wTIXCdQvIDU

    Featured Petition:

    Breonna Taylor
    https://www.change.org/p/andy-beshear-justice-for-breonna-taylor-4c6f7413-93d3-417e-8a81-acf85700e51a

    Take Action
    www.producershappyhour.com/take-action

    Do The Work
    Educate yourself on systemic racism, and how you play a part, and what to do about it.
    https://www.producershappyhour.com/do-the-work

    Rob Bluemke - Sound Mixer/Engineer
    Show Editor
    www.robertbluemke.com

    Christopher Daniels - Creative Director
    Logo & Artwork Design
    www.misterstyles.com

    Kyle Puccia - Commercial/Theatrical Music Composer
    Intro/Outro Music
    www.kylepuccia.com

    Follow The Hosts
    Sister Christian
    Insta: @sisterchristianrocks
    Website: www.sisterchristianproduces.com

    Lawrence T. Lewis
    Insta: @lawrenceltl
    Producing: www.lawrencetlewis.com
    Voice Over: www.voiceoflawrence.com

    Follow The Show
    Website: www.producershappyhour.com
    Insta: @producershappyhour
    Facebook: producershappyhourgroup.com
    Linkedin: www.linkedin.com/groups/13819792/

    Share Your Story
    E

    How is Artificial Intelligence Changing Cyber Crime?

    How is Artificial Intelligence Changing Cyber Crime?

    Cyber threat intelligence is a conceptual term with an international impact. Agencies around the world are racing to identify and stop cybercriminals from infecting and infiltrating networks to use our data against us. In this episode of No Password Required, Dr. Sagar Samtani, assistant professor of information systems and decision sciences at the University of South Florida, explains the cyber threat intelligence (CTI) life cycle and what you and/or your organization should do to help protect data assets and prevent cyberattacks.

    Data is the prime target of many cybercriminals, yet what data they are searching depends on their goals. Are they scraping for social security numbers? Obtaining passwords? Collecting credit card numbers? Or worse? And why? It’s hard to imagine all the ways that data can be exploited.

    Your data is widely available depending on where and how you store your data and whom you give permission to access that information. Personal choices, like having a smartphone, can be a gateway to someone collecting your data. Being on the grid with a social security number, health insurance, financial accounts, all these bits of information are housed somewhere, and cybercriminals know this. With the help of artificial intelligence (AI), cybercriminals are able to scrape data faster than ever before and with the launch of quantum machines, our security choices will be paramount to protecting our identity and data assets.

    Cyber threat intelligence is helping individuals and industries protect themselves by understanding what is important, what are the exploits, and how to effectively respond. It is also helping to refine artificial intelligence algorithms to better assist in threat analytics. Dr. Samtani describes how industries are responding to industry-specific cybercrimes and developing response standards, protocols, and frameworks. He gives the example of the healthcare industry and HIPAA compliance as well as financial institutions and their evolving PCI compliance protocols. Understanding why a data asset is a target is a key facet to the cyber threat intelligence life cycle.

     

    What are the Four Phases of Cyber Threat Intelligence?

    1. Identify what assets you (an organization) possess that hold value, e.g., a social security number, and how to protect those assets
    2. Data collection that is relevant to those critical cyber assets
    3. Threat analytics – whether traditional or AI techniques are being utilized
    4. Operational Intelligence – how is the compromised data actually used or exploited

    Dr. Samtani explains there are two basic types of cyber threat intelligence analytics. First are the traditional threats, such as malware analysis. The second category is quickly changing as artificial intelligence evolves: data mining, text mining, and natural language processing based on pattern and techniques. Building systems that are designed to log and report data is crucial to discovering breaches and reporting them to prevent further penetration.

     

    Once Data is Stolen, Where Does it Go?

    Dr. Samtani discusses how hackers, cybercriminals, even geopolitical threat actors are using the data. He explains how the Dark Web is playing a role as a marketplace and toolbox for hackers. He details the four basic platforms--forums, Dark Web marketplaces, darknet carding shops, and internet relay chat--that cybercriminals use to complete their tasks and possibly grow their notoriety. Hacker behavior on the Dark Web is unlike traditional crime circuits where anonymity is preferred. There are tiers of hacker and they can use their screen names to build their reputation for monetization, credibility, and recognition. Artificial intelligence is being fine-tuned to help detect cybercriminals through intelligent predictions.

     

    Security Protocols and the Danger of Oversharing

    Individuals, organizations, developers, and even marketers play a role in security. Developers who were once tasked in racing product to market are now evolving to build-in and protect against exploits. Cultures are changing to bring awareness of the dangers of oversharing and learning from other’s breaches and incidents. Dr. Samtani and No Password Required host Bill McQueen discuss how oversharing can be as simple as a phone call asking what version a software is on and divulging that information, likening that to handing over the keys to a car.

     

    The Study of Cybersecurity Science

    As computing evolves, so do the crimes; the cybersecurity field is in the infancy of where it will be potentially. Developing talented professionals to stop cybercriminals, building frameworks and protocols, and advocating for strong cyber cultures at home and in the workplace will be essential to the future. There is ample opportunity for employment and research in the field of cybersecurity, cyber threat research, and cyber threat intelligence.

     

    TIME STAMPS

    1:12 Who is Dr. Sagar Samtani

    1:30 How Does AI Automate Cybercrime and Cyber Threat Intelligence

    3:08 The Four Phases of the Cyber Threat Intelligence Life Cycle

    7:43 How Do You Rate and Respond to a Cyber Threat

    10:03 Industry Specific Frameworks for Threat Identification and Mitigation

    10:24 Data Characteristics in Cybersecurity

    11:20 Defcon and AI Village

    11:48 Tuning Algorithms for Cybersecurity

    12:54 How are Hackers Fighting Against AI Detection

    13:53 Developing Organizational Strategies to Counter Cybercrime

    15:19 Cybersecurity/AI Ethics and Rules

    18:40 Dark Web & Data

    19:38 Dark Web Platforms

    22:53 Access to Dark Web Platforms

    23:50 Hacker Notoriety – Reputation, Monetization and Detection

    27:40 Developers & Cyber Security Protocols

    29:35 Double-Edged Sword of Sharing Cybersecurity Capabilities

    30:40 Operational Intelligence and Risk Management

    31:58 Hacker Behavior on the Dark Web/Darknet

    33:40 What Can We Do to Protect Ourselves? Following the CTI Lifecycle

    35:44 Cybersecurity Science as a Legitimate Field

    Ep. 81: Healthcare Innovation, Data Access & the Blockchain —with Kat Kuzmeskas of SimplyVital

    Ep. 81: Healthcare Innovation, Data Access & the Blockchain —with Kat Kuzmeskas of SimplyVital

    Building a blockchain startup is hard enough. How do you educate the market around the technology itself? How do you communicate the business case for your product? But if you’re really looking for a challenge, build a company with a focus on innovation in the healthcare space—an industry notoriously slow to adopt advanced technology!
    Katherine Kuzmeskas is the founder and CEO of SimplyVital Health, a startup building the blockchain infrastructure for healthcare. By way of open source and proprietary software, SimplyVital leverages the blockchain as a tool to increase data access and decrease the cost of healthcare, globally. Before becoming an entrepreneur, Kat cut her teeth in hospital administration, serving as Program Manager and Strategic Planner for the Yale New Haven Health system.
    Today, Kat joins us to discuss the challenges of innovating in the healthcare space, describing the market’s slow adoption of advanced technology and the reteaching necessary around the role of the blockchain. She shares her interest in healthcare administration and explains how a year with Teach for America led to her idea for SimplyVital Health. Listen in for Kat’s insight on leading a global company and learn how persistence, organization and the will to win lend to her success as a startup founder.

    Topics Covered

    The function of SimplyVital
    Blockchain infrastructure for healthcare
    Proprietary and open-source software
    Data access to decrease costs globally

    Kat’s insight on leadership
    Solo musician/athlete vs. band/team
    Compare to CEO of global company

    The challenges of innovating in healthcare
    Slow to adopt advanced technology
    Must understand business perspective

    Kat’s advice for startups in the healthcare space
    Identify customers, run product by them first
    Remember that healthcare is business (ROI)

    Kat’s path to founding SimplyVital Health
    Clinical rotations in Ecuador
    Interest in operations, administration
    Teach for America student dashboard
    Apply data-driven decision-making to healthcare

    Kat’s strengths as a startup founder
    Persistence (outwork others)
    Extremely organized
    Competitive, curious

    How Kat educates the healthcare market on blockchain
    Recognize long sales cycle
    Reteach as necessary
    Consulting arm, course on Udemy

    How Kat financed SimplyVital
    Self-funded first year
    Equity round with venture investors
    Revenue from purchase of tokens

    Kat’s definition of success
    Personal fulfillment
    Doing good in world

    Connect with Kat

    SimplyVital Health https://www.simplyvitalhealth.com/

    SimplyVital on Twitter https://twitter.com/SimplyVitalHQ

    SimplyVital on Facebook https://www.facebook.com/SimplyVitalHealth/

    SimplyVital on LinkedIn https://www.linkedin.com/company/simplyvital-health/

    Kat on LinkedIn https://www.linkedin.com/in/katherinekuzmeskas/

    Kat on Twitter https://twitter.com/kkuzmesk?lang=en

    Resources

    Blockchain and Healthcare on Udemy https://www.udemy.com/blockchain-and-healthcare/

    Chuck Klosterman X: A Highly Specific, Defiantly Incomplete History of the Early 21st Century by Chuck Klosterman

    http://chuckklostermanauthor.com/books/chuck-klosterman-x-tr/chuck-klosterman-x-hc

    Connect with Boost VC

    Boost VC Website https://www.boost.vc/

    Boost VC on Facebook https://www.facebook.com/boostvc/

    Boost VC on Twitter https://twitter.com/BoostVC

    Health IT and Accelerating Innovation – Top Docs Radio

    Health IT and Accelerating Innovation – Top Docs Radio
    Health IT and Accelerating Innovation This week I sat down with experts from the healthcare IT sector. John Mamon is the CEO of mPoweredIT, an outsourced IT company that devotes expertise to the small to mid-sized medical practice, helping them manage their computer hardware, infrastructure, and software needs for far less than it typically costs […] The post Health IT and Accelerating Innovation – Top Docs Radio appeared first on Business RadioX ®.

    Patient Engagement – Top Docs Radio

    Patient Engagement – Top Docs Radio
      Patient Engagement This week I caught up with our friend, Frank Martin, of The Medical Consultants Group. We talked about how his consulting firm can help a wide range of medical practices, from solo offices to multi-site large groups. Frank talked about the variety of facets of a business that is a medical practice […] The post Patient Engagement – Top Docs Radio appeared first on Business RadioX ®.
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io