Skip to content

Cybersecurity for Radiologists and Allied Businesses

Virtual

Explore the terrain of data breaches in Medical Imaging Technology, DICOM, PACS, VNA, RIS, Telehealth, AI-based imaging technology and Healthcare SaaS. This webinar is designed for professionals working in the field of Radiology and allied businesses. It will highlight the sources of a breach, ways to prevent a data breach and avoid the loss of […]

How to Succeed at SOC 2

Virtual

Organizations zealously pursue their SOC 2 Certification in order to impress prospective clients and sign more deals since it proves their commitment to information security. It is a highly respected credential and is vital while showcasing the efficacy of an organization' data security policies and procedures. However, the journey to becoming SOC 2 compliant and […]

Telehealth and HIPAA

Virtual

Telehealth Solutions have been a panacea during the pandemic. They provided patients and healthcare professionals the much-needed flexibility of receiving medical care without risking exposure to Covid-19 or commuting while coping with infection. In this webinar, databrackets will shed light on HIPAA Compliance and how it applies to telehealth solutions. Our guest speaker, Jit Chawla, […]

Business Continuity and Disaster Recovery Planning for Healthcare Organizations

Virtual

It is vital for healthcare organizations to continue to operate even when they encounter disasters. These include but are not limited to ransomware attacks, software malfunctions, extreme weather incidents and disturbance to essential services like electricity, internet, etc. Terrorist attacks add to this uncertainty and make it difficult to ensure that crucial systems are available. […]

Security Risk Analysis for MIPS MACRA

Virtual

One of the eligibility criteria for MIPS is to confirm that patient data is being managed securely. To prove this, your practice needs to undergo a security risk analysis (we call it the annual tech physical!) to identify technical vulnerabilities in the way electronic Protected Health Information (ePHI) is managed by your eHR system. In […]

Prepare for CMMC 2.0

Virtual

Suppliers who plan to work with the Department of Defense (DoD) need to comply with CMMC 2.0 controls. This new standard will become applicable in a matter of months and has significant differences compared to its predecessor CMMC 1.0. On your journey to ensuring your systems are compliant with the new set of controls, you […]