Skip to main content

Webinar Recap: HIPAA & HITECH - How IAM Bridges the Compliance Gap

March 01, 2013

On February 28th, healthcare information security and compliance experts from FishNet Security and Ping Identity presented a joint Webinar to some of the nation's leading healthcare provider organizations. During the presentation, our experts discussed the current state of HIPAA and HITECH compliance as evidenced by last year's preliminary HIPAA audits conducted by the Department of Health and Human Services (HHS) Office for Civil Rights (OCR), how Identity & Access Management (IAM) can help close the compliance gaps identified for security and privacy, and the best practices for conducting HIPAA Risk Assessments as recommended by the OCR.

In addition, they presented a unique look at the role IAM can play in helping to ensure compliance and meaningful use objectives can be met through a "Day in the Life" scenario, the business case for the various user communities within provider organizations, and how specific technology can automate IAM processes for on-premise and cloud applications - including managing users access rights within a hybrid environment.

 

Agenda:

  • Current state of industry compliance and key challenges for 2013
  • Conducting HIPAA & HITECH assessments as required by HHS
  • How the strategic application of seamlessly integrated technology can provide additional benefits, including:
    • Reducing clinician downtime waiting for access to systems needed to perform work
    • Ensuring that clinicians have access to systems they need, when they need it, with role and lifecycle management
    • Reducing the number of logon credentials for clinicians with Federated SSO and enhanced management of profiles, passwords and access requests

Additional Resources:

Related Blogs

December 18, 2017

Security vs. End User Experience – Find the Balance

Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the organ...

See Details

October 06, 2017

Avoid User in Training

Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are s...

See Details

July 12, 2012

Worried about a potential HIPAA audit? You should be.

For years the health care industry has dealt with the daunting challenge of understanding and determining how to comply with privacy and security rule...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

February 03, 2014

HIPAA Compliance

Technology is used today to exchange health information in an electronic environment. The use of this technology will greatly enhance the delivery of ...

See Details

June 11, 2010

To Do List: #1 - Align Your Business with HIPAA/HITECH

In February 2009, President Obama signed into law the American Recovery Reinvestment Act (ARRA), an economic stimulus package that included new Health...

See Details

July 25, 2017

Identity and Access Management Program Primer

Learn how to create an identity and access management maturity roadmap tailored for your organization.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.