Best breach notification podcasts we could find (Updated April 2018)
Related podcasts: Hhs Omnibus Rule Breach Notification Breach Notificaiton Hipaa Compliance Security Rule Privacy Rule Hitech Act Hipaa Compliance Legal Business  
Breach notification public [search 0]
show episodes
 
Discusses topics related to how the HITECH Act is transforming HIPAA: 1) provides exposure to industry thought leaders; 2) analysis of proposed and promulgated HHS/OCR rule making; and 3) sharing of industry best practices.
 
Loading …
show series
 
https://api.spreaker.com/v2/episodes/14179289/download.mp3 Mythos, Episode 2. UVB-76 Welcome to Mythos. Nothing weird is out of bounds in this blog turned story series, read by me, Gary S. Pritchett. Each episode begins innocently enough, with a brief introduction, then quickly spirals into mayhem with a reading from one of my own books…or take ...…
 
In this episode Armen is joined by Tamara McCleary, CEO of Thulium.co. They explore the benefits of accepting that digital business growth now depends on a great customer experience. Transcript Armen: Hi, I’m here with Tamara McCleary for today’s edition of Digital Identity 360. We’re actually on location at the Digital Identity Summit in San F ...…
 
The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannon ...…
 
MacOS root login vulnerability disclosed in public over Twitter How to Fix it Apple's Response India Sets Strongest Net Neutrality Protections in the World System76 to disable Intel Management Engine Uber Covered up the breach of 57 million users’ data Uber: "Shiny things!" Tesla Unveils their Semi Bitcoin is CRAZY these days... The Internet of ...…
 
Warning! I forgot to silence my Discord channels, so that stupid notification bloop is going to be popping up occassion. Today we cover Through the Breach, Wyrds delightful RPG that's a companion to Malifaux miniatures. I have with me Victoria (sort of), Sean Overton from A Wyrd Place Podcast and Adam from Cheated Fates. We hope we can convince ...…
 
La sortie de Java 9, la mise en open source d’une mégachiée de projets, la sortie d’une tétrachiée de framework webs et bien d’autres choses encore. Enregistré le 26 septembre 2017 Téléchargement de l’épisode LesCastCodeurs-Episode–178.mp3 News Langages Java 9 est sorti avec plein de choses dedans 9 Java Champions on Java 9: Part 1 Part 2 Mark ...…
 
La sortie de Java 9, la mise en open source d'une mégachiée de projets, la sortie d'une tétrachiée de framework webs et bien d'autres choses encore. Enregistré le 26 septembre 2017 Téléchargement de l'épisode LesCastCodeurs-Episode-178.mp3 News Langages Java 9 est sorti avec plein de choses dedans 9 Java Champions on Java 9: Part 1 Part 2 Mark ...…
 
A sermon preached by Rev. Ginger E. Gaines-Cirelli at Foundry UMC, September 24, 2017, the third sermon in the series “Composition 101.” Text: Exodus 3:1-12 To compose is to create. Composers create music. God creates life. Musical compositions employ different elements to give them depth, interest, texture. Over the past couple of weeks, we’ve ...…
 
“What you can’t prevent, you need to detect. Once you detect, you need to respond.”These are words of wisdom shared by John Moran, Senior Incident Response Analyst at NTT Security during a conversation he had with ITSPmagazine’s editor in chief, Sean Martin, during the recent Black Hat USA 2017. With breach notifications on the rise, its clear ...…
 
The General Data Protection Regulation (GDPR) has significantly upped the ante when it comes to liabilities and penalties. There are various guidelines notified and mandated by GDPR which has direct liabilities onto the organizations (of any kind processing the personal data of EU residents). Some of them worth mentioning are data breach notifi ...…
 
Developer Stuart Grant talks to James about the marketing power of apps for authors and how they can help deepen the connection between author and readers – and help attract new fans. This week’s key highlights: Why apps are such a hot topic right now How authors can take advantage of apps for building rapport with an audience On the extraordin ...…
 
As a real estate agent I see emails all the time that are from fake title companies asking me to open an attachment. I also see emails from fake agents or buyers asking me to open attachments as well. I am usually smart enough to spot the fake emails, but some can seem very real or even appear to be from someone I know. It is pretty easy for so ...…
 
Troy Hunt is a web security guru, Microsoft Regional Director, and author whose security work has appeared in Forbes, Time Magazine and Mashable. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications. In this podcast, we discuss the challenges of the industry, learn about his perspective ...…
 
Handling and manipulating patient information is critical for health tech startups, but, in dealing with patient medical information, known as protected health information (PHI), startups must be well-versed in how to remain compliant. In this webinar discussion, we will break down the various components of HIPAA, including the privacy rule, th ...…
 
https://livingstoneadvisory.com/wp-content/uploads/2017/06/Episode-16-Best-practices-to-mitigate-data-breach-risk.mp3 Data Breach Risk is real, and of increasing concern to business leaders, regulators and customers. Audio of Rob Livingstone’s presentation at Trend Micro’s Executive briefing events Sydney and Melbourne 5-6 June 2017 on Australi ...…
 
JC Gaillard, Simon Goldsmith and Stephen Deakin sift the data and discuss what organisations must be aware of before the 25th May 2018 deadline. Image montage by Matt Gore using graphics from www.eugdpr.org the GDPR portal By Mark Chillingworth As the countdown begins, technology leaders discuss the implications of GDPR jQuery(document).ready(f ...…
 
Please note that due to a recording issue, the audio of this message skips near the middle and a short section is left out. This morning is Mother’s Day, a day when we honour the influence and example of love and sacrifice that encompasses the highest ideals of motherhood. This is a time when the major changes and challenges in the family have ...…
 
Sue Foster is a London-based partner at Mintz Levin. She has a gift for explaining the subtleties in the EU General Data Protection Regulation (GDPR). In this first part of the interview, she discusses how US companies can get caught up in either the GDPR's extraterritoriality rule or the e-Privacy Directive's new language on embedded communica ...…
 
We take a look at a recent case by Google against one of its former employees that throws up some very interesting issues for businesses of all sizes. In this episode, we'll also cover the most common issues caused by exiting staff members and the simple steps an organisation can put in place to protect itself from some of these high cost issue ...…
 
OCR Resolutions 3 and 4 for 2017 were released in February. Examples of what not to do from OCR were released AGAIN. We kept waiting for another resolution to be announced and lump them together. Once we gave up and recorded this episode to review those two you know another one was announced. We will hit that one next time. For now, we review w ...…
 
Just in time for Tax Day, the IRS issued a new new phishing scam warning. This ingenious new threat combines business email compromise and W-2 fraud; cybercriminals posing as company executives send emails to employees in payroll and HR, requesting a list of all employees and their W-2 forms. The result: stolen money and reams of confidential d ...…
 
HIPAA Omnibus Breach Notification Lunchtime webinar with Karen Davidson , Esq., a Founder of Mackarey & Davidson, P.C. The post HIPAA Omnibus Breach Notification appeared first on First Healthcare Compliance.
 
Recently, New Mexico passed a new data breach notification law in March. Once it is signed there will only be 2 states that don't have their own notification rules, Alabama and South Dakota. What do all the state laws mean when you are also required to do HIPAA notifications. Most of them say that if you are subject to GLBA or HIPAA the notific ...…
 
Click here to debate with us It was a complete break of diplomatic convention when Trump spoke with Taiwan, but should it? In this episode Sebastian and Dirk try to decide if diplomatic protocols are really that essential to peace and international conduct. Image Source: CC0, Pixabay Episode Transcript Dirk – Welcome everyone to another episode ...…
 
Sam Monreal on Effective Lead Generation Techniques "Many people look at online leads as a burden and not an opportunity" Sam Shift Mindset from Bothering to Helping People "We have to work twice as hard to stand out with internet leads." STEPS TO EFFECTIVE INTERNET LEAD GENERATION Get People while Still Online Use Pattern Interrupts Great Scri ...…
 
http://www.smbjumpstreet.com/wp-content/uploads/2017/03/SMB-Jumpstreet-011.mp3 NEWS Sage buys Fairsai – HRMS – Sage People – probably explains why CEO Stephen Kelly skipped out on his namesake “CEO Circle” event which was held for the top Sage partners in Costa Rica February 23-27, 2017. Sage annual meeting was also the Tuesday after CEO Circle ...…
 
I recently came across an article that gave me pause, “Why Data Breaches Don’t Hurt Stock Prices.” If that’s the case and if a breach doesn’t impact the sale of a company, does security matter? So I asked the Inside Out Security Panel – Forrest Temple, Mike Buckbee and Kilian Englert. They gently reminded me that there’s more than just the stoc ...…
 
HIPAA Breaches & Desk Audits What is a breach? In simple words, the loss of patient protected health information, either printed or electronic. How common are breaches within pharmacies? There are two types of pharmacies and pharmacy owners, The first are the ones who know they have had a breach The later are the ones who have had a breach and ...…
 
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
 
Google login Twitter login Classic login