Information Security Leader, Author, Instructor and Speaker

Default utility Image

HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: | The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many¬†different …Continue reading →

Default utility Image

Compliance in the Cloud TAGS: | | As enterprises around the world adopt cloud computing strategies, personally identifiable information, health records, credit card numbers and other regulated …Continue reading →

Default utility Image

Healthcare and Internet of Things Security TAGS: | There are now more things connected to the Internet than people on the planet, and the number is growing rapidly: …Continue reading →

Default utility Image

Can legal departments complement IT security? TAGS: | | | Legal teams have long played an important role in information security and compliance programs. The expertise that attorneys bring to …Continue reading →

Default utility Image

What the Community Health Systems Breach Can Teach Your Organization TAGS: | In the spring of 2014, hackers penetrated the systems of Community Health Systems (CHS), a network of 206 hospitals located …Continue reading →

Default utility Image

Three steps to avoiding massive HIPAA violation fines TAGS: | | | Million-dollar penalties are drawing the attention of HIPAA-covered entities around the nation. To avoid running afoul of HIPAA regulations, there …Continue reading →

Default utility Image

Compliance 101: What do enterprises need to include in compliance training? TAGS: | | Listening in on conversations around the water cooler at organizations of all sizes gives the impression that compliance awareness is …Continue reading →

Default utility Image

Business associates: How to manage the new HIPAA problem child TAGS: | With the HIPAA Omnibus Rule in full effect, one of the big changes introduced is the newfound liability heaped on …Continue reading →

Default utility Image

HIPAA Omnibus Rule 2013: How to implement continuous compliance TAGS: “Scramble — it’s compliance time!” Words to this effect are uttered in the hallways of many offices as HIPAA-covered entities …Continue reading →

Default utility Image

Descoping To Reduce Compliance Burdens TAGS: | | Compliance is a pain. Organizations around the world decry the onerous burdens placed upon their IT organizations by the laws …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple