Preferred
(EDT)

122 - Rock Your Cyber Health - Awareness Brings New Responsibilities

3:00 PM - 4:00 PM EDT
Thursday, April 28, 2022Room: Seminole B
Overview

All nurses play a critical role in preventing disruption of clinical care by protecting patients and data against cybercrime, as well as supporting safe patient care. This session highlights the cybersecurity concerns and gaps related to the devices and technology currently utilized in clinical practice. Current cyber laws, regulations, and case studies will be shared from a nurse informaticist specializing in cyber law and cybersecurity risk mitigation, and data governance strategies are examined.

Continuing Education Instructions and Disclosure Information:

Contact hours available until 4/29/2024.

Requirements for Successful Completion:

Complete the learning activity in its entirety and complete the online nursing continuing professional development (NCPD) evaluation. You will be able to print your NCPD certificate at any time after you complete the evaluation.

Disclosure of relevant financial relationships with ineligible companies (planners, faculty/speakers, reviewers):

Planning Committee and Abstract Reviewer Disclosures:

There are no Planning Committee and Abstract Reviewer disclosures to declare.

Speaker Disclosures:
Leta Cross-Gray, MSL, MSN, RN-BC, discloses that she serves as an independent consultant.

There are no other speaker disclosures to declare.

Commercial Support:
No commercial support declared.

Accreditation Statement:
This educational activity is jointly provided by Anthony J. Jannetti, Inc. (AJJ) and the American Nursing Informatics Association (ANIA).

Anthony J. Jannetti, Inc. is accredited as a provider of nursing continuing professional development by the American Nurses Credentialing Center’s Commission on Accreditation.

Anthony J. Jannetti, Inc. is a provider approved by the California Board of Registered Nursing, provider number CEP 5387.

Learning Outcome:
After completing this learning activity, the participant will be able to identify at least one best practice to mitigate cybersecurity risk.

Credits
1.00 CH
Resource
    • 122_Mohiuddin
Other
Leadership Strategies
cybersecurity
iot
medical devices
cybersecurity governance
cyber hygiene

Privacy Policy Update: We value your privacy and want you to understand how your information is being used. To make sure you have current and accurate information about this sites privacy practices please visit the privacy center by clicking here.