HIPAAWorkshops are unique, practical, hands-on learning opportunities. Each workshop is facilitated by experts in their fields who are ready to share their knowledge and answer your specific questions. Participants will also learn from each other as they share learning experiences and successful practices. Seating is limited - register today!
HIPAA Workshop: IT Security
Mobile Device SecurityMobile devices have become an integral part of society. Business needs to learn to conform to new technology. Unfortunately, mobile devices have largely been developed as a 'prosumer' device first, with business needs a secondary concern. Now, manufacturers and vendors are trying to 'build it in' with security with varied results.
Remote Access SecurityIncreasingly, we need to be able to work from where ever we are. The world is paced for on-demand information which is available at all times. Remote access is a conundrum in that it fulfills it's promise of extending the local network to anywhere in the world.
Culture of being educated about Information SecurityInformation security is a relatively new formalized discipline which operates in the information technology sphere. Mistakenly, even IT professionals think of security as an afterthought, often held at a length of arms reach. This is a contrarian position, considering information security crosses many domains. Nor, is it an all or nothing proposition, small increases in knowledge can have a net positive effect on the overall security posture of an organization.
Missing or outdated security policiesPolicy is a necessary burden on the shoulders of the employees of an organization. It lays out the by-laws which in a hierarchical fashion all standards, guidelines and procedures can be built. Policy does not have to be a struggle, it can simply be thought of as the task of putting to paper the business processes and knowledge wrapped up as capital in the minds of the employees.
End-User over access (Too much general access)Information security as a principle of least privilege. It means to give access that is only necessary to complete a task or fulfill a job function. The challenge is that it is simpler to give an employee access to all things that they might need as a way to combat potential inefficiencies by avoiding technology from standing in the way of job function. At its core, this principle violates Occam's Razor, a principle in which decisions can be made by taking the obvious solution that makes the simplest assumptions ... or does it?
Missing security patchesPatching is the low hanging fruit of the information technology/information security world. Why is it rarely done on a consistent basis? Here lies challenges and inconvenient truths about human nature.
Stages of Compromise and DetectionOMG! What do we do? What is happening? How did we get here? Who do we need to notify? Are all questions in the hopefully unlikely event of a compromise you don't want to have to answer completely for the first time during an incident. Planning is still the best combative technique available to our arsenal and will be our strongest ally. The art of planning for a compromise presupposes that other important necessary steps have been acted upon. In part, due diligence of having a polished computer security incident response plan.
wednesday, oct 8, 2014, 9a-Noon
The Lodge Des Peres
1050 Des Peres Rd
St Louis, MO Map
$250 per practice includes two participants.
For additional participants and/or materials, please call (314) 541-2220.
Eric W. Humes | CEO
Montez A. Fitzpatrick | Director of Information Security and Compliance, Keystone IT
Diane S. Robben | Shareholder
Sandberg Phoenix & von Gontard P.C
For more information, please contact Ann Grana at (314) 541-2220.