Healthcare Compliance Events

Events

Upcoming events

Please check back later for additional events.

On-Demand

Health Industry Cybersecurity Practices (HICP) – The Carrot vs. The Stick!

Original Date: Wednesday, July 21, 2021

ComplyAssistant invites you to a special event webinar on HICP and Risk Register. We will explain the new cybersecurity practice guidelines for small, medium, and large healthcare organizations and how our Risk Register helps you manage the Health Industry Cybersecurity Practices (HICP).

Signed into law on January 5, 2021, HICP provides a practical “cookbook” of recommended security practices to reduce the threat of the top five cybersecurity threats.

The HHS “stick” can be replaced with the HICP “carrot”, and following HICP guidance will reduce cybersecurity risk for service provider organizations. By documenting and demonstrating evidence of compliance for 12 months, covered entities and business associates could receive:

Are you trying to document and assess all the risks and vulnerabilities? 

ComplyAssistant’s new easy-to-use Risk Register software functionality, is ready to assist in the documentation, assessment, and mitigation of risks across your enterprise.

Let us show you how using Risk Register for collecting and assessing your risk is the HICP starting point enterprises of all sizes need.

Speakers:

Gerry Blass, President & CEO, ComplyAssistant
Ken J. Reiher, MBA, Vice President Operations, ComplyAssistant
Laura Casey, Account Management, ComplyAssistant
Donna Grindle, Founder and CEO, Kardon

Cybersecurity Update from the Experts

Original Date: Friday, June 25, 2021

This webinar covered the following:
In this session, hear from a panel of healthcare Information Technology leaders from three types of healthcare organizations located in NY and NJ. The discussion will focus on internal and external cybersecurity risks and identify new risks directly related to the 2020 pandemic. Listen as the panel shares lessons learned and advice for reducing cybersecurity risk.

Learning Objectives:

The Information Technology Project

Original Date: Wednesday, June 9, 2021

This webinar will cover the following:
The Information Technology Project (IT Project), previously known as the Community Management Information System (MIS) initiative began in May of 1984 and is a joint undertaking between the New Jersey Division of Mental Health and Addiction Services (DMHAS) and the New Jersey Association of Mental Health and Addiction Agencies, Inc. (NJAMHAA) to enhance the development and promotion of an effective, efficient and high-quality community mental health, substance use and intellectual/ developmental disabilities (I/DD) services system in New Jersey by adopting, implementing and appropriately using technology.

The goal of the NJAMHAA IT Project is to maximize providers’ effective and efficient use of technology while serving the most vulnerable residents of New Jersey through the provision of technical education, hardware and software maintenance, and technical assistance and support, in all areas of business operations, including but not limited to corporate compliance, quality assurance, billing and collections and human resources.

The NJAMHAA IT Project developed this annual conference to meet the needs of and enhance communication among information technology professionals, as well as executives and clinical managers, within mental health care, substance use treatment and I/DD service agencies.

WEBINAR: How to Be Ready to Pass a Surprise COVID-19 Audit

The New Jewish Home in NYC was audited by the Department of Health (DOH) in the middle of the pandemic and passed the audit with excellent results. In this on-demand webinar, Dana Penny, Chief Compliance Officer at The New Jewish Home in NYC discusses how any type of healthcare provider can be prepared to provide excellent documentation should they undergo a surprise audit.

Viewers will learn:

PRESENTATION: It’s Not Just IT: Why Cybersecurity and Risk Management Needs a Multi-Disciplinary Approach

Cybersecurity and risk management is a responsibility that everyone shares. It requires a top-down approach and commitment shared by every member of the senior leadership team. 

In this presentation, Gerry Blass, President and CEO of ComplyAssistant, and Bob Babin, Director, Strategic Initiatives and Chief Information Security Officer at Saint Peter’s Healthcare System discuss an action plan for developing a multi-disciplinary program that will protect healthcare organizations’ confidential information, brand, information system assets and patient PHI. Using real-world case studies, the presentation will provide strategies and justification for funding a robust, long-term cybersecurity and risk management program.

From this presentation, you will learn how to:

PRESENTATION: Who’s Holding Your PHI? A Strategic Plan to Take Control of Your Security Risk Management

Every healthcare provider, regardless of size or complexity, should have a strategy in place for security risk management. With momentous changes in healthcare technology over the past four decades, protected health information is more valuable now than ever before, making it more vulnerable to breach.

In this presentation, Gerry Blass, President and CEO of ComplyAssistant, and Mike Chirico, former Information Security Officer with New Bridge Medical Center, demonstrate the importance of properly funding and resourcing a security risk management strategy, and propose how healthcare providers can build their own program using action steps.

In this on-demand presentation, Gerry and Mike:

WEBINAR: Manage Third Party (BA) Risk by Exception

A significant number of HIPAA breaches are caused by business associates (BAs) and their downstream BAs. What should covered entities (CEs) do to protect themselves, demonstrate due diligence and reduce risk?

CEs are responsible to manage their BAs from both a contract standpoint and an information privacy and security standpoint. And, BAs are responsible to do the same for their own subcontractors (aka downstream BAs).

This webinar includes what CEs and BAs should consider when implementing a functional BA management program, such as:

WEBINAR: Third Party Security Risk Management

In this on-demand webinar from ComplyAssistant, hear from a General Counsel, Chief Compliance Officer and Chief Information Security Officer about their challenges and goals for effectively managing their third-party business associate contracts and risk.

In this presentation, you will hear:

WEBINAR: OCR Phase 2 Audit Protocol

Join Helen Oscislawski, founder of Attorneys at Oscislawski LLC, for this on-demand webinar that reviews the OCR Phase 2 Audit protocols. At the time of this webinar, covered entities had begun to receive requests for information from OCR related to the HIPAA Phase 2 Audits. These requests will form the basis for the final pool of auditees. 

In this on-demand webinar, you will learn how to: