Digital Library

12 Documents

Cybersecurity Learning Session #3- Business Continuity

The Cybersecurity Learning Series presented by Online Business Systems covers basic cybersecurity templates and plans.

Cybersecurity Learning Session #3- Business Continuity

The Cybersecurity Learning Series presented by Online Business Systems covers basic cybersecurity templates and plans.

CHCANYS Q&A: Third Party Apps and Patient Privacy

In this Q&A, cybersecurity expert Online Business System addresses questions around patient health data privacy and considerations consumers should be aware of when sharing data with third party health apps, taking into account the Patient Access final rule and new Information Blo

Cybersecurity Learning Session #2- Security Risk Assessment

Cybersecurity Learning Session #2- Security Risk Assessment March 12, 2021

Cybersecurity Learning Session #1- Incident Response Plan

Cybersecurity Learning Session #1- Incident Response Plan February 4, 2021

NYPORTS Serious Reportable Events

CHCANYS NYS-HCCN Cybersecurity Workshop: NYPORTS Serious Reportable Events

ICS Chart for Cybersecurity

CHCANYS NYS-HCCN Cybersecurity Workshop: ICS Chart for Cybersecurity

A Real Security Encounter: Cyber Terrorism Case Study

CHCANYS NYS-HCCN Cybersecurity Workshop: Open Door Case Study Presentation

Maintaining Cybersecurity When Disaster Strikes

CHCANYS NYS-HCCN Cybersecurity Workshop: Maintaining Cybersecurity When Disaster Strikes

Using Emergency Management for Cybersecurity Preparedness, Response, and Recovery

CHCANYS NYS-HCCN Cybersecurity Workshop: Using Emergency Management for Cybersecurity Preparedness, Response, and Recovery

Cybersecurity Webinar Series Part II - Cybersecurity Hazards: Threat, Assessment & Recovery

Focus on cybersecurity as a specific hazard, assessment of vulnerabilities, making a robust plan and recovering quickly when affected.

Cybersecurity Webinar Series Part I - Emergency Management Planning for Cybersecurity

Introduction, general concepts of emergency management that would be important to consider for cybersecurity and protecting your data and systems.