Anatomy of a Breach
Share this program:
August 12, 2020
Ohio Health Care Association
Assisted Living, Home Care, Hospice, ID/DD, Skilled Nursing
Given the rise in the attacks, this session has been purposefully designed to provide hands-on tools and real-world examples (and solutions) to help your organization. Using a case, this session will dive deep into how a security breach could occur at an Organization, share the controls that were in place, and, more importantly, the controls that were missing or not working as designed. You will gain a real-life understanding of what went wrong. Different methods used by fraudsters to breach Organizations will be discussed along with the ultimate goal of the fraudster. Attend this session to learn what your organization can do not to become the next headline.
- After this session, the participants will be able to understand the importance of effective controls to strengthen their Organization's information security environment
- After this session, the participants will have a better understanding of the risks impacting their Organization's information security environment.
- After this session, the participants will be able to understand the impact information security has on their Organization, employees and residents.
Program Titles and Supporting Materials
This program contains the following components:
If applicable, you may obtain credit in multiple jurisdictions simultaneously for this program (see pending/approved list below). If electing credit for this program, registrants in jurisdictions not listed below will receive a Certificate of Completion that may or may not meet credit requirements in other jurisdictions. Where applicable, credit will be only awarded to a paid registrant completing all the requirements of the program as determined by the selected accreditation authority.
Click on jurisdiction for specific details:
How to Attend
Join the self-paced program from your office, home, or hotel room using a computer and high speed internet connection. You may start and stop the program at your convenience, continue where you left off, and review supporting materials as often as you like. Please note: Internet Explorer is no longer a supported browser. We recommend using Google Chrome, Mozilla Firefox or Safari for best results.
You may access this course on a computer or mobile device with high speed internet (iPhones require iOS 10 or higher). Recommended browsers are Google Chrome or Mozilla Firefox.