Kroll Ontrack | Home

On-Demand Webinars



Cyber Crime and the Insider Threats in Data Security

Whether driven by opportunism, greed, a desire for revenge, or a combination of all three, company insiders exploit their positions of trust to obtain access to their organization’s most valued digital assets. Moles, opportunists, contractors, disgruntled employees, and ex-IT personnel—all currently pose a greater risk to corporate intellectual property than state-sponsored hacking and APTs,...



Third Party Breaches and the Art and Science of PHI/PII Identification

Kroll Advisory Solutions hosted this live webinar on May 7, 2013 that featured a panel of industry experts sharing recent case experiences, discussing the challenges and nuance of third party breach response, and exploring how to develop a sound and defensible solution no matter the circumstances.   Responding to a data breach is never easy. But when the data exposed is not your own, the...



Navigating HIPAA/HITECH Security and Privacy Rules: What to expect when HHS is inspecting

Kroll Advisory Solutions hosted this live webinar on December 12, 2012 that featured a panel of industry experts discussing how to satisfy the Privacy Rule and Security Rule obligations for HIPAA/HITECH and how to prepare for an audit or HHS investigation. They cover what has been learned over the past year and offer insights to help you meet regulatory obligations and protect your...



How to Avoid the Data Breach Hot Seat

You operate in a complex risk environment where patient care involves much more than medical treatment—it also involves keeping patient information secure. Cyber criminals have targeted the healthcare industry for a long time, and they’ve become quite adept at infiltrating organizational networks—often staying there without detection for months or even years. As you move toward virtualization...



Financial Services Webinar

Few organizations carry as much sensitive personal information – or as much risk – as financial services firms. In an environment of high risk and highly mobile data, your incident response can make or break your breach event. Now is the time for financial organizations to think beyond the status quo and focus on ways to enhance and improve incident response. Join panelists Alan Brill, Ted...



Target: Healthcare

With the new breach notification requirements and transition to electronic health records, the security stakes are even higher. The healthcare industry is facing a firestorm of change – federal breach notification laws, regulatory oversight of multiple agencies, and differing state laws that are sometimes in conflict with federal regulation. Yet, for all this change, the checklist mentality...



Kroll-HIMSS Analytics 2010 Webinar on Security of Patient Data

As the healthcare industry prepares for a major shift to electronic health records (EHRs) over the next several years, a new bi-annual report, commissioned by Kroll Fraud Solutions, casts doubt on the ability of providers to adequately secure patient data in a rapidly changing landscape. The 2010 HIMSS Analytics Report: Security of Patient Data, indicates that a false sense of security among...



Low-Tech is the Path to HITECH Webinar

As organizations geared up to comply with the new provisions of the Health Information Technology for Economic and Clinical Health Act (HITECH), which went into effect on February 17, 2010, Kroll Fraud Solutions offers guidance on important steps they should take to safeguard the Protected Health Information (PHI) and Personal Identifying Information (PII) they possess. Kroll Fraud Solutions'...