Skip to Content
Webinar

Cybersecurity: Seven questions every executive needs to ask

Date:
February 26, 2019; 2:00 – 3:30 EST
Plante Moran is pleased to partner with OHCA to present a webinar on cybersecurity. Our own Philip Long and Scott Petree will discuss cybersecurity and what seven questions every executive needs to ask.

 Person using phone and laptopSenior care providers and aging services organizations are among the most frequently pursued targets for cyberattacks. Long-term, post-acute care, and senior care providers are at greater risk than other health care providers because their information security program is often less mature. Even if HIPAA does not apply to your organization, you must still protect sensitive personal resident information and meet state regulations.

Listen to Plante Moran’s cybersecurity principals Philip Long and Scott Petree as they present an on-demand webinar designed to help healthcare and senior care and living executives evaluate cybersecurity compliance, and build a robust and risk-focused cybersecurity culture. This informative executive webinar will focus on seven questions that you should ask to help you identify where your organization may be at risk, understand cybersecurity threats and how they can impact your organization, identify vulnerabilities and how to mitigate them, learn management techniques to strengthen your compliance program, and build a strong, risk-focused cybersecurity culture within your organization.

This informative executive webinar will focus on the seven questions that you should ask to help identify where your organization may be at risk. After listening to this webinar, you’ll be able to:

Related Thinking

Nonprofit staff talking about the biggest risks their organizations are facing.
March 4, 2025

Common risks nonprofits are facing in 2025

Article 6 min read
Group of nonprofit professionals in a meeting.
March 12, 2024

2025 Nonprofit Summit

Webinar 4 hour watch
Cybersecurity professionals reading lines of code on their computer screen.
February 10, 2025

The crucial role of firewall configuration in cybersecurity

Article 3 min read