Netwrix Workshop: File Analysis

About this webinar

Recorded: June 28, 2016

Watch the recorded webinar to learn how to quickly detect excessive access rights, overexposed data, suspicious access attempts and more.

Hosted by
Adam Stetson,
Systems engineer

Surviving Pitfalls: A Step-by-Step Guide for HIPAA Risk Analysis

HIPAA security risk analysis remains a top source of confusion and concern among IT pros. HIPAA-covered entities keep generating large volumes of data and PHI, IT systems are increasingly complex, and cyber threats continue to evolve. How can you ensure HIPAA compliance in the face of what seems like an endless number of challenges?

To help, we’ve put together the key concepts around risk analysis and the steps for getting started. Tune into this webinar with renowned HIPAA expert David Ginsberg to discover:

  • The differences between risk analysis and risk assessment for HIPAA
  • How to spot and remediate risks while adopting a cloud-first strategy
  • A checklist for your business associates to minimize the risk of a third-party data breach
  • How to minimize the exposure of your PHI by automatically redacting sensitive data from files
  • Does a HIPAA SRA help with new laws like the California Consumer Privacy Act?
24
September
1:00pm EDT
24 September, 1:00pm EDT
Register Now