Kevin Henry | Accountable Author

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert
Security Risk Assessment Checklist for HIPAA: Identify, Prioritize, Remediate
Risk Management Oct 31, 2024

Security Risk Assessment Checklist for HIPAA: Identify, Prioritize, Remediate

HIPAA Security Risk Assessment Requirements. What HIPAA expects. Your organization must conduct...

Best Practices to Assess and Address Security Risks to ePHI
Risk Management Oct 31, 2024

Best Practices to Assess and Address Security Risks to ePHI

Protecting electronic protected health information (ePHI) demands a disciplined, continuous appro...

Examples and Requirements to Assess and Address HIPAA Security Risks
HIPAA Oct 31, 2024

Examples and Requirements to Assess and Address HIPAA Security Risks

Scope the Assessment. Define the systems, people, and processes that create, receive, maintain, ...

HIPAA Security Risk Assessment and Mitigation: Step-by-Step Guide
HIPAA Oct 31, 2024

HIPAA Security Risk Assessment and Mitigation: Step-by-Step Guide

Scope the Assessment. Define objectives and boundaries. Clarify why you are performing a HIPAA ...

How to Conduct an AI Security Risk Assessment for HIPAA-Covered Healthcare Organizations
Risk Management Oct 30, 2024

How to Conduct an AI Security Risk Assessment for HIPAA-Covered Healthcare Organizations

An effective AI security risk assessment helps you harness clinical AI safely while meeting the H...

AI Security Risk Assessment Checklist: Protect PHI and Meet HIPAA Standards
HIPAA Oct 30, 2024

AI Security Risk Assessment Checklist: Protect PHI and Meet HIPAA Standards

Breach Notification and Compliance Audit. Establish a breach notification program that anticipat...

Cloud Code Risk Assessment Explained: HIPAA Requirements, Steps, and Examples
Risk Management Oct 30, 2024

Cloud Code Risk Assessment Explained: HIPAA Requirements, Steps, and Examples

A cloud code risk assessment helps you identify how application code, pipelines, and cloud servic...

Practical Security Risk Assessment Example for HIPAA Compliance: Worksheet and Walkthrough
Risk Management Oct 30, 2024

Practical Security Risk Assessment Example for HIPAA Compliance: Worksheet and Walkthrough

HIPAA Security Risk Assessment Overview. This practical security risk assessment example for HIP...

Cloud Code Security Risk Assessment Checklist for HIPAA-Regulated Organizations
HIPAA Oct 30, 2024

Cloud Code Security Risk Assessment Checklist for HIPAA-Regulated Organizations

HIPAA Security Rule Compliance. Use this checklist to align your cloud code security program wit...

Best Practices to Evaluate Cloud Application Code Risks for HIPAA Compliance
HIPAA Oct 30, 2024

Best Practices to Evaluate Cloud Application Code Risks for HIPAA Compliance

Evaluating cloud application code for HIPAA compliance means proving that security and privacy co...

How to Threat-Model and Scan Cloud Code Risks for HIPAA Readiness
HIPAA Oct 30, 2024

How to Threat-Model and Scan Cloud Code Risks for HIPAA Readiness

HIPAA readiness starts by understanding how your cloud services handle protected health informati...

AI Security Risk Assessment Explained: Common Risks, Controls, and Compliance Examples
Risk Management Oct 30, 2024

AI Security Risk Assessment Explained: Common Risks, Controls, and Compliance Examples

An AI security risk assessment helps you identify, analyze, and treat threats that affect confide...

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Kevin Henry

Kevin Henry

CEO @Accountable

As founder and CEO of Accountable, Kevin leads our mission to simplify HIPAA compliance for healthcare organizations. With a background in healthcare technology and healthcare, he has been instrumental in developing innovative solutions that make compliance accessible and manageable for organizations of all sizes.