Personal Information
Organization / Workplace
Carpinteria, CA United States
Industry
Technology / Software / Internet
Website
About
Redspin has been in business for over 11 years now and we are leaders in the Healthcare IT security industry. As providers of IT security assessments such as penetration testing, web application assessments and social engineering assessments we are passionate about helping clients protect critical data, harden web applications, maintain compliance, and reduce overall risk.
Tags
redspin
hipaa
hitech
healthcare it security
information security
hipaa security risk analysis
healthcare it
it security
hipaa risk analysis
ephi
hipaa security
meaningful use
hipaa security rule
hipaa it security
redspin it security
business associates
redspin security
healthcare
healthcare information security
penetration testing
network security
hipaa security audit
phi
hitech act
hipaa audit
hipaa compliance
hipaa assessment
application security
data breach
web application security
mobile security
hipaa sra
hipaa risk analysis assessment
hipaa enforcement
hipaa audit advisory
hipaa auditors
hipaa risk analysis audit
hipaa regulations
protected health information
meaningful use incentives
meaninful use
hipaa risk assessment
web security
healthcare security
hhs
ocr
risk management
mobile security policy
security risk
hipaa testing
password policies
redspin breach report
security policies
hipaa audits 2012
hipaa 2012
healthcare it audits
healthcare it audit
health care it security
ehr
risk assessment
business associate
iphone security
wireless security
add windows account
windows
bank security
enforce password history
browser add-ons
chrome extensions
password policy
chrome extension
health information
managing windows
windows command line
hipaa risk
hipaa security assessment
breach report
windows user account
ephi breach
healthcare data breach
hipaa security risk assessment
maximum password age
minimum password age
policies and procedures
google chrome
top security threats
ehr meaningful use
social engineering
redspin hipaa
kpmg
iphone apps
it security assessment
top security 2011
sql injection risks
social media security risk
top security risks
apple store live
top security threats 2011
vendor security
top risks 2011
mobile security risk
top security issues
mobile apps
mac goes live
facebook app scandal
mac osx apps
mobile app security
sql injection
mobile devices in the enterprise
ibmcom developer portal defaced
ibm hacked
hmei7 ibm
hmei7
ibm defaced
ibm portal
ibm
ibm portal defaced
ipv5 networks
ipv6 scan
ipv6 scan tools
ipv4
ipv6 networks
how to ssh tunnels
jacking husband
email hacking
privacy breach
identity theft
ehr incentive programs
black swan theory
national commission report
black swan
risk analysis
healthcare information
bp oil spill lessons
national commission
oil well lessons
national commission report on bp
bp oil spill
bp lessons
how to acheive meaninful use
apple apps
vendor management
virtualization security
social media risk
mac apps
it audit
experian security
experian assessment
ei3pa
experian third party assessment
mac app store
experian audit
pc scan
email hacking felony
prevx 30
endpoint security
prevx
nessus
nessus output
how to sort nessus results
vulnerability scanners
nbesort
sorting nessus results
nbesortrg
sorting nessus
iphone security management
mobile application security
native mobile applications
html5-based apps
attack surface area
source code review
android security
o-day exploits
cyber war
stuxnet
vulnerabilities
information warafare
power facilities
electronic attacks
browser extensions
browser addons
top information security threats
hie security
hie privacy and security considerations
health information exchange security
hitech security
android security policy
ipad
application security policy
iphone security policy
blackberry
android
apps security policy
ipad security policy
app security policy
ipod
smart phone security policy
tablet computer security policy
mobile device risk assessment
iphone
mobile device
mobile device security policy
tablet
nessus results
guide to nessus
chrome web store
auditing tools
password cracking tool
l0phtcrack
paswoord tools
password cracker
it security tools
security tools
pasword cracking
data breaches
information security program
cybercrooks
infosec breach
mcdonalds data breach
mcdonalds hack
it security breach
security testing
breach
gawker hack
security assessments
infosec program
silverpop hack
mcdonalds breach
financial organizations
online banking
chrome security
browser extensions
browser addons
chrome web store
chrome security
julian assange
ddos attacks
wikileaks
wikileaksorg
anonymous
anonymous hackers
project payback
data loss prevention
it security risk
dlp
workplace mobile security
smart phone security
ipad security
portable media security
mobile devices in the workplace
and procedures
it security policies
technical controls
password tool
securid tokens
rsa breach
data security
john halamka
common weakness enumeration
mitre
web app security
cwraf
top web app vulnerabilites
vulnerablities
2011 web app vulnerabilites
top web vulnerabilities
cwe
common weakness risk analysis framework
cve
common vulnerabilities and exposures
sans
security vulnerabilities
sans top 25
cwe/sans top 25 most dangerous software errors
cwss
common weakness scoring system
vulnerability
it audit firm
pen test company
healthcare it assessment
"social engineering"
"lockheed breach"
"lockheed martin breach"
"securid tokens"
"rsa breach"
"rsa hack"
"security awareness training"
"lockheed hack"
"rsa security breach"
"hipaa it security"
"hipaa security risk analysis"
"hipaa security rule"
"business associates"
"healthcare it"
"meaningful use"
"hipaa security"
"healthcare business associates"
"healthcare it security"
lockheed breach
rsa hack
rsa security breach
lockheed hack
lockheed martin breach
security awareness training
it audit company
stage 2 meaningful use
himss
cms
cyber insurance
it securityredspin
data breachephi data breach
cyber security risk
hipaa audit protocol
ocr audits
hipaa audits
it security audit
hipaa compliance audit protocol
hipaa hospital audit
hipaa compliance audit
healthcare it security audit
healthcare risk assessment
redspin healthcare
hsra
heatlhcare it security
healthcare breaches
2012 breach report
meaningful use requirements
omnibus rule
hipaa omnibus rule
phi breach
declaration of independence
pen testing company
it security assessment firm
it security assessment company
computer security
authentication
ffiec
online authentication
ffiec it security
emr
wireless network security
wireless security controls
meaningful use audit
stage 1 meaningful use
pen testing
how an internal penetration test can help
internal penetration test
pen test
pentest
compromised web server
penetration test
why perform internal pen test
security risk assessment
meaningful use it security
stage 1
breach notification to covered entities
hitech assessment
healthcare business associates
hipaa business associates
hitech audit
hitech meaninful use
hipaa meaninful use
ehr incentive
pci dss 20 is released what are the new requiremen
infosec information overload
security policy and controls
top 10 security issues
kroll
hospital risk assessment
hiteh requirements
hospital it security
meaninful use incentives
meaninfurl use
hitech compliance
hospital hitech
hospital hipaa
hitech security assessment
health information security
ephi breach report
healthcare breach report
phi breach report
online security
wifi security
public wifi security
ssh tunnels how to
safely browse the internet
public wifi
how to set up an ssh tunnel
ssh tunnel
creating ssh tunnels
how to use an ssh tunnel
safely browse internet
ssh tunnels
safely browse on the go
safely browse public internet
password database breach
prevent password hacking
password breach
password security
password hack
45 cfr 164308a1
electronic health records
college of healthcare information management execu
ehr incentives
national health information system
chime
healthcare breach
privacy rule
covered entities
privacy and security violations
security assessment
charleston area medical center camc
health it security
camc
bas
business assoicate
top security
bank it security
top it security
mobile security policy template
heathcare rfp template
hipaa rfp
healthcare rfp
hipaa rfp template
healthare it
applying for meaningful use
how to apply fo rmeaninful use
hipaa conference
ocr nist hipaa conference
ocrnist hipaa security conference
hipaa security risk
oig
reported to hhs
hitech brech notification
ephi breaches
healthcare breches
meaninful use requirements
redspin webinar
protect phi
phi rules
how to protect phi
breach notification
protecting phi
safeguarding phi
protect ephi
nasdaq
nasdaq systems breached
nasdaq hacked
nasdaq security
nasdaq breached
directors desk
nasdaq breach
nasdaq directors desk
cloud security
cloud computing security
cloud security best practices
cloud computing
onc
See more
- Presentations
- Documents
- Infographics