<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / risk</title>
<link>http://netvouz.com/lillymark/tag/risk?feed=rss&amp;pg=10</link>
<description>lillymark&#39;s bookmarks tagged &quot;risk&quot; on Netvouz</description>
<item><title>Governance Risk and Compliance Management</title>
<link>http://www.egestalt.com/governance-risk-and-compliance.html</link>
<description>eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security &amp; IT-GRC through an integrated dashboard</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 01 Mar 2012 10:56:54 GMT</pubDate>
</item><item><title>governance, risk and compliance</title>
<link>http://www.egestalt.com/governance-risk-and-compliance.html</link>
<description>eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security &amp; IT-GRC through an integrated dashboard</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 13 Jul 2012 11:16:59 GMT</pubDate>
</item><item><title>governance, risk and compliance</title>
<link>http://www.egestalt.com/governance-risk-and-compliance.html</link>
<description>eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security &amp; IT-GRC through an integrated dashboard</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 13 Jul 2012 11:18:03 GMT</pubDate>
</item><item><title>Hackers Exploit Opportunity-Execute Well-Planned Attack</title>
<link>http://www.egestalt.com/blog/2012/11/19/hackers-exploit-opportunity-execute-well-planned-attack/</link>
<description>While the hacker attacks on big banks generated headlines and attracted mass attention, hackers – this time from across borders, made the most of this opportunity to execute a well-planned attack of a much more serious nature.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 03 Dec 2012 11:47:57 GMT</pubDate>
</item><item><title>Health Breach Tally Hits a New Milestone</title>
<link>http://www.egestalt.com/blog/2014/07/03/federal-health-breach-tally-hits-a-new-milestone/</link>
<description>A thousand incidents and counting, the federal health breach tally hits an all-time high, now listing 1,010 major breaches reported since federal regulators started to track them in September 2009 after the HITECH Act came into effect.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 04 Jul 2014 09:53:08 GMT</pubDate>
</item><item><title>Health Data – A Goldmine for Hackers</title>
<link>http://www.egestalt.com/blog/2014/07/16/health-data-a-goldmine-for-hackers/</link>
<description>The latest incident involved the Vermont Health Connect where a cyber-attack seems to have taken place last December, with hackers accessing health data 15 times.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Jul 2014 11:18:22 GMT</pubDate>
</item><item><title>HIPAA Audits- Timeline &amp; Insights</title>
<link>http://www.egestalt.com/blog/2013/06/21/hipaa-audits-timeline-insights/</link>
<description>The results of the 115 HIPAA compliance audits conducted as part of the pilot project last year are being evaluated, said Susan Mc Andrew of the Department of Health and Human Services’ Office for Civil Rights, and the HIPAA compliance audit program will not resume until after the current fiscal year ends.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 01 Jul 2013 11:42:27 GMT</pubDate>
</item><item><title>HIPAA Omnibus Extends Compliance Liability down the Chain</title>
<link>http://www.egestalt.com/blog/2013/02/19/hipaa-omnibus-extends-compliance-liability-down-the-chain/</link>
<description>The HIPAA Omnibus rule has made significant impact on the healthcare industry. It has created a complex chain of compliance liability for covered entities, their business associates and subcontractors, who are all now equally accountable for the protection of private health information, and responsible for the compliance conduct of their ‘downstream’ partners under certain circumstances, according to Data Security attorney Stephen Wu.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 27 Feb 2013 06:24:24 GMT</pubDate>
</item><item><title>HIPAA Omnibus Rocks the Health IT Security Landscape</title>
<link>http://www.egestalt.com/blog/2013/02/19/hipaa-omnibus-rocks-the-health-it-security-landscape/</link>
<description>With the release of Omnibus HIPAA privacy and security rule on January 17th this year, the health information security landscape is set to experience some major changes. Healthcare entities are facing the immediate need to conduct risk assessments and testing to meet HIPAA compliance requirements.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 27 Feb 2013 06:25:41 GMT</pubDate>
</item><item><title>Holistic Data Protection Solutions through Modular Approach</title>
<link>http://www.amazines.com/article_detail_new.cfm/5690288?articleid=5690288</link>
<description>Technological innovations and enhancements when on one hand has given the enterprises wider scope and faster methods to manage the day-to-day operations, on the other hand has drastically changed  the threat landscape.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 May 2013 05:09:32 GMT</pubDate>
</item></channel></rss>