• Mail
  • Linkedin
  • Twitter
Hire Us
Law and Forensics
  • Home
  • Products
  • Services
    • Cybersecurity Services
      • Assessments
      • Board Consulting
      • Data Governance
      • Due Diligence
      • Financial Institutions
      • Incident Response
      • Investigations
      • Privacy
      • Tabletops
    • eDiscovery Services
      • Consulting
      • Data Preservation
      • Expert Witness
      • Training Practice
    • Forensic Services
      • Cloud Computing
      • Consulting
      • Expert Testimony
      • Internet of Things
      • Investigations
      • Mobile Device
      • Dispute Resolution Services
      • Social Media
      • Server Forensics
  • Insights
  • About Us
  • Search
  • Menu
  • Cybersecurity: Latest Legal Developments Around Cybersecurity Attacks and Data Breaches in Healthcare Sector

    WEBINAR

Cybersecurity: Latest Legal Developments Around Cybersecurity Attacks and Data Breaches in Healthcare Sector

Format: On Demand
Duration: 1 Hour 0 Minutes

Register

About This Webinar

Recent cyber attacks on hospitals and healthcare facilities have illuminated the emerging risks facing the healthcare industry. These organizations have become popular targets for their sensitive client data and their light cybersecurity defenses. The Global Cyber Institute and Thomson Reuters have brought together cyber experts and healthcare industry leaders to discuss cyber attacks on the healthcare industry. Speakers will offer insight as to why healthcare organizations are uniquely vulnerable to cyber attacks, and recommend steps these organizations can take to minimize the risk of a successful attack. This lecture is a must attend for both in-house and outside counsel for healthcare organizations.

This course is brought to you by the Global Cyber Institute and Thomson Reuters and it is national accredited (get CLE in all 50 states).

Topics that will be discussed:

  1. The current state of cybersecurity in the health care industry
  2. Risks across the Health Care Industry
  3. Lessons learned from the latest healthcare breaches
  4. Highlights from a 2017 Health Care Industry Cybersecurity (HCIC) Task Force report
  5. Recommendations minimize the risk of a successful attack

Who should attend?

  • Lawyers
  • Insurance executives
  • In-house counsel
  • Business executives
  • Privacy attorneys

Speakers

  • Daniel Garrie, Law & Forensics
  • Bruce Sackman – Mount Sinai Healthcare System
  • Dave Summitt – Chief Information Security Officer, Moffitt Cancer Center

Attending the webinar

If you would like to attend the program, please click this link and add the program to your “Cart.” Please note you may need to click the link twice to reach the webinar’s page. To register for the program for free please use the following code: LNF100. When checking out please make sure that you only have this webinar in your cart, otherwise you may encounter problems when checking out. If you know someone who might be interested in this webinar, please forward this email to them.

About Law & Forensics

Law & Forensics is a strategic consulting firm with a global presence that assists clients with sensitive and complex electronic discovery, information governance, computer forensic, information security, and privacy issues. With a strong record for getting results, reducing costs, mitigating legal risks, and delivering value, Law & Forensics provides corporations, government agencies, law firms and other legal, business, and technology stakeholders with solutions to address complex litigations, sensitive investigations, and regulatory inquiries.

Read More

Pages

  • About Us
  • About Us
  • Affiliations
  • Articles
  • Bill Spernow
  • CCPA
  • CCPA Request
  • Cloud Computing
  • Cloud Computing Forensics
  • Cloud Computing Forensics
  • Computer Forensics
  • Consulting
  • Consulting
  • Contact
  • Cyber Security
  • Cyber Security
  • Cyber Security Assessments
  • Cyber Security Consulting for Large Financial Institutions
  • Cybersecurity Board-Level Consulting Practice
  • Cybersecurity Data Governance Practice
  • Cybersecurity Incident Response
  • Cybersecurity Privacy Practice
  • Cybersecurity Services
  • Cybersecurity Tabletop Practice
  • Cybersecurity Third Party Due Diligence
  • Daniel Garrie
  • Data Breach Investigations
  • Data Loss Prevention
  • Data Mapping and Acquisition
  • Data Recovery
  • Data Recovery
  • Dispute Resolution
  • E-Discovery
  • E-Discovery Dispute Resolution
  • eDiscovery Consulting
  • eDiscovery Data Preservation
  • eDiscovery Expert Witness
  • eDiscovery Services
  • eDiscovery Training Practice
  • Education & Training
  • Employment
  • Engagements
  • Event Catalog Page
  • Expert Witness
  • Forensic Expert Testimony
  • Forensic Investigations
  • Forensic Neutral
  • Forensic Neutral and Dispute Resolution Services
  • Forensic Services
  • Forensics Consulting Practice
  • Forensics Investigations
  • FRCP 30(b)(6) Deposition Practice
  • Home
  • HOME
  • Insights
  • Internal Investigations
  • Internet of Things Forensics
  • Law And Forensics: Computer Forensics, E-Discovery, Cyber Security
  • Law Firm Technology
  • Legal Notices
  • Litigation Strategy
  • Litigation Support
  • Marc Strauch
  • Mobile Device Forensics
  • mockpage
  • News
  • Office Locations
  • Our experience
  • Philosophy
  • Press Inquiries
  • Privacy Hub
  • Privacy Policy
  • Privacy Policy Demo
  • Products
  • Resource Library
  • Sarah Haines
  • Social Media
  • Social Media Forensics
  • Thought Leadership
  • Virtual and Physical Server Forensic Practice
  • Webinar Catalog
  • White Papers
  • Yoav Griver
  • Special Master
  • Expert Witness
  • Keyword Mediation
  • Education & Training
  • Predictive Coding Consulting

Categories

  • Article
  • Computer forensics
  • Cyber security
  • Cyber Warfare
  • Data privacy
  • E-discovery
  • Events
  • News
  • news
  • Webinars

Archive

  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • February 2016
  • January 2016
  • December 2015
  • April 2015
  • February 2015
  • October 2014
  • September 2014
  • June 2014
  • April 2014
  • March 2014
  • October 2013
  • June 2013
  • June 2012
  • April 2012
  • June 2011
  • June 2010
  • February 2010
  • January 2010
  • September 2009
  • March 2009
  • January 2009
  • June 2008
  • May 2008
  • April 2008
  • February 2008
  • January 2007
  • December 2006
  • October 2006
  • June 2006

Newsletter

Contact Us

Contact Us
Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

CYBERSECURITY PRACTICE

Assessments
Board Consulting
Data Governance
Due Diligence
Financial Institutions
Incident Response

Investigations
Privacy
Tabletops

EDISCOVERY PRACTICE

Consulting

Data Preservation
Expert Witness

Training Practice

FORENSICS PRACTICE

Cloud Computing
Consulting
Expert Testimony
Internet of Things
Investigations
Mobile Device
Dispute Resolution Services
Social Media
Server Forensics  

ARTICLES

Browse All Articles

LECTURES

Browse All Lectures

RECOURSES

About Us
Events
Search

Law & Forensics © 2020. All Rights Reserved
  • Privacy Policy
  • Legal Notices
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings

How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy