We invite you to attend our free workshop, “Cybersecurity Awareness: How to Protect Your Organization from Threats,” on Thursday, June 8th in Cleveland, Ohio. Hosted by industry expert John Nye, this three-hour workshop will review the current landscape of emerging and trending cybersecurity threats, methods used by hackers to compromise systems, and proven strategies to close security gaps and combat these threats. Additionally, we will showcase live demos of actual attacks commonly used by hackers along with a discussion of how these attacks affect healthcare organizations.
Topics covered during the workshop include:
Current Cybersecurity Landscape in Healthcare and How It Will Continue to Evolve
Methods Used by Hackers to Compromise Systems, Including Live Demonstrations
Real-World Examples and Lessons Learned from Operational Disruption Caused by Cyberattacks
Regulatory Requirements and Guidance Addressing Cybersecurity
Best Practices for Protecting Your Organization from Cybersecurity Threats
How to Create Cybersecurity Awareness at an Organization-Wide Level
Register For This Event
Why You Should Attend
- 80% of HIMSS Cybersecurity Survey respondents reported their organization experienced as least one recent “significant security incident”.
- Industry experts predict that even more cybersecurity attacks by hackers will occur in 2017.
- The average cost of a data breach for healthcare organizations is now over $2.2 million, while the average cost of a data breach for business associates is over $1 million, according to the Ponemon Institute.
- Email, mobile devices, IoT, network security, cloud-based systems, applications and servers continue to be the top areas of vulnerability for cyber attacks.
- The first step to combat threats is to create awareness across the enterprise and implement proactive, not reactive, security measures.
- Top Cybersecurity Threats
- Hacking Methods
- Strategies to Combat Threats
- Cybersecurity Regulatory Requirements & Guidance
- Lessons Learned from OCR Audits & Investigations
Who Should Attend
- IT VPs & Directors
- Security Analysts
- Risk Managers
- Compliance Officers and Managers
- Privacy Officers and Managers
What Past Attendees are Saying
I appreciate an organization that is willing to share information for free. Those that have little to give keep what little they have close. However when you are willing to share for free, there is more to be had and they are truly at the top of their field.
I was happy to see that this was not just a sales pitch for a product, but truly an educational offering.