The threat landscape is evolving, regulatory expectations are rising, and the stakes are higher than ever as digital health intersects with artificial intelligence. Join legal, compliance, and security experts from Wilson...more
9/9/2025
/ Artificial Intelligence ,
Business Associates ,
Covered Entities ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Digital Health ,
Electronic Protected Health Information (ePHI) ,
Enforcement ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Security Rule ,
Popular ,
Proposed Amendments ,
Risk Management ,
Webinars
Recently proposed amendments to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule are designed to enhance the cybersecurity of electronic protected health information (ePHI). These updates aim to...more
Following the Office for Civil Rights (OCR) recent publication of four settlements as part of a new Risk Analysis Audit Initiative. We explore the current regulatory language for Risk Analysis, the proposed language for Risk...more
4/16/2025
/ Compliance ,
Covered Entities ,
Data Breach ,
Enforcement Actions ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Security Rule ,
HIPAA Violations ,
OCR ,
Ransomware ,
Risk Assessment ,
Risk Management
In December 2023, the New York Department of Financial Services (NY DFS) issued amendments to the cybersecurity requirements, originally adopted in 2017, which include expanded control requirements and stricter reporting...more
This is the final installment in a series of articles on the core functions of the National Institute of Standards and Technology (NIST) Privacy Framework where we cover the Protect function.
As previously published in an...more
11/9/2021
/ Cybersecurity ,
Data Loss Prevention ,
Data Protection ,
Data Security ,
Incident Response Plans ,
NIST ,
Popular ,
Privacy Framework ,
Privacy Laws ,
Siemens ,
Vulnerability Assessments