Responsible for Your Organization’s Privacy and Security Program?
- Make Sure Your Practice Is HIPAA Compliant – Even Though You Don’t Have the Training, Background (or even interest)
- Master the Must-Know Essentials You Need to Oversee Your Practice’s Privacy and Security Program – in Just TWO Days
- Reserve Your Place for Privacy Officer Organizational Fundamentals (a.k.a. “POOF”)
Your practice is required to comply with HIPAA. And you know it’s important – for your organization and your patients.
But when you have zero experience or training to effectively handle the responsibility (not to mention your “real” job to do) … it’s hard to find the enthusiasm to take on such a complex and confusing project. It’s much easier to ignore the issue … and roll the dice that you won’t get caught.
We can help.
How You’ll Benefit By Attending
This in-depth training will empower you to:
- Understand exactly what’s needed to safeguard your practice.
- Protect patients’ valuable data from dangerous breaches.
- Recognize privacy and security risks – and the potential employee errors that may leave you exposed.
- Build a solid understanding of the Privacy Framework – the foundation for an effective privacy program.
- Approach your program with solid privacy principles that apply to your regulatory environment (HIPAA, SOC 2, PCI, etc.).
- Increase your confidence at being able to handle this important role.
- Gain peace of mind that you’re properly managing your organization’s privacy and security program.
- Get a jumpstart on preparing to sit for the CIPM if you choose.*
- Walk out the door ready to create your organization’s privacy and security plan.
What You’ll Receive
- Instruction from a top privacy and security expert, Roger Shindell, M.S., CHPS, CISA, CIPM, the CEO of Carosh Compliance Solutions.
- A spot in this 2-day, limited-seating training workshop. To make sure you get plenty of personal attention to have your questions answered, we keep the group small. (A $2,500 value)
- A workshop binder containing slides, worksheets, checklists, resources and other tools. Capture your notes in the binder and refer to these materials again and again once you get back to the office. (A $500 value)
- Breakfasts and lunches. We’ll arrange these meals so that you can maximize the time you spend networking with your peers. (Dinners are on your own.) (A $100 value)
- A cocktail and networking reception. As the designated privacy officer for your organization (whether that’s your title or not), you bear a serious responsibility – and face numerous challenges few understand. Here’s a fun opportunity to meet, commiserate and brainstorm with your peers. (A $50 value)
What You’ll Learn
- Your 10 main areas of responsibility as a privacy program manager
- The real costs of poor privacy … and what most organizations overlook
- Why privacy management is such a hot topic and growing industry – and why your organization can’t afford to ignore it anymore
- The difference between “personal information” and “personal data” – and why your privacy program must protect both
- Why privacy strategies must be customized to your organization (and why copying what another organization is doing leaves you vulnerable)
- Ways to use technical and physical controls to protect information
- Why audits are an important part of a proper privacy program … and how to pick your auditor
- 7 questions to ask to ensure you identify and minimize the risk presented by business associates
- The key privacy data protection laws you need to be aware of – including HIPAA
- Who most organizations overlook when designing and implementing privacy programs – and why this mistake could be fatal to your organization
- Why keeping a data inventory is critical – and how to create your quickly and easily
- What your organization must master to be able to ensure that patient information remains secure
- The “CIA” Information Security Triad … and how to use it within your organization to improve data security
- How to calculate and analyze the true Return on Investment (ROI) in your privacy and security program
- What you’re legally required to do when a privacy breach occurs
- The 5 most common ways breaches occur … click here to see the full list.
- The 2 domains in CIPM Certification … and why you should care about both (even if you never plan to become certified)
- How your location affects what you’re required to do to protect “sensitive” personal information
- The top 3 reasons organizations begin privacy programs
- The 3-step process for establishing a privacy program
- Why a vision or mission statement is vital to creating a strong privacy program … and the 4 key elements to include
- How to develop a privacy strategy for personal information
- The 7 most common elements included in data protection regulations
- 4 critical steps to developing a privacy framework
- 6 phases for building a privacy team
- What data inventories and risk assessments are … and how they help you get a handle on what you’re supposed to be protecting
- The 9 key elements of a data inventory … and what most organizations overlook
- How to establish the current baseline of what you’re doing to protect patient information … and use it to guide your next steps
- The 4 phases of the privacy policy life cycle … and what you should do in each phase
- What a privacy assessment is … and how to tell if your organization needs one
- The difference between “education” and “awareness” when it comes to your privacy program … and the role that each plays in protecting patient information
- 7 steps to starting a privacy maturity model
- How to determine the privacy legal requirements you need to follow by asking 7 powerful questions
- Think privacy is only your responsibility? No! These 6 departments all play a role
- The 5 characteristics of good metrics … and how they’ll make it easier to monitor the effectiveness of your privacy program
- The 10 types of metrics you need to develop to fully understand how well you’re protecting data
- The #1 thing you need to know about your organization to interpret how the various privacy requirements affect you
- Who within your organization should be involved in privacy (hint: you should not be the only one!)
- The types of data that gets collected in each department … and how to make sure everyone is conforming to regulatory practices when collecting, using and sharing information
- The 11 principles of the proper management of data and information
- The potential standards that determine how risk is identified, controls are selected and implemented, and risk is tracked
- Two forms of privacy controls … and when to use each
- 14 critical competency areas that need to be developed to improve information security … and what needs to be done in each area
- The 7 fundamental principles of privacy by design … and how using them strengthens your privacy program
- Which processes need to be analyzed with privacy metrics
- The 5-step metric life cycle … and which most often get missed
- One of the easiest ways to choose the metrics you’ll develop
- 5 potential errors you can make when using metrics – and how to protect against them all
- Your choices for how you’ll monitor metrics … and how to pick the right form for your organization’s needs and situation
- Strategies for monitoring and analyzing the trends in your organization’s privacy and security program
- What factors to consider when defining the value of an information asset
- The 3 types of audits you need to conduct – and how often to use them
- The most commonly overlooked and underestimated component of any privacy program
- 3 things you must do when reviewing and monitoring the framework of your privacy and security program – and how often these things should happen
- 11 stakeholders to notify when a breach occurs
- A proven 5-step process for handling privacy and security incidents
- 8 activities your response team should undertake as soon as a breach is discovered
Payment Information
Pay in full ($2,799) or provide a deposit ($500) to secure your spot.
Full payment is due 48 hours prior to the event.
For alternative payment arrangements, please call (877) 778-1816.
Frequently Asked Questions
For alternative payment arrangements, please call (877) 778-1816.
Breakfast and lunch will be provided both days. In addition, you’re invited to a farewell cocktail and networking reception at the end of Day 1. Dinner is on your own both nights.
Let’s talk! We offer a variety of training solutions, and we’re happy to help you find the best path forward based on your organization, resources, time and interest. Call us now at (877) 778-1816 or book an appointment.
The training can be beneficial to all executives and senior personnel individuals designated as the Chief Privacy Officer (CPO), Chief Security Officer (CSO), Office Manager and others.