regulation of Medicine


Cybercrime and Healthcare: Preparing for the Inevitable [47mins]

Gain important insights and learn:

  • How to respond to a ransomware attack
  • Tips on configuring your network
  • Ransomware prevention
  • HIPAA & HITECH advice
  • How to protect your organization Followed by a live Q&A.


Scott Grubman, JD, Partner at Chilivis, Cochran, Larkin & Bever LLP

Scott Grubman is a former Assistant U.S. Attorney and DOJ Trial Attorney who represents companies and individuals in connection with government and internal investigations, False Claims Act and complex civil litigation, and white collar criminal defense.  

Donna Grindle, CHPSE, CHPC, Founder and CEO of Kardon Compliance

As Founder and President of Kardon Compliance, Donna’s extensive experience is focused on developing and maintaining effective privacy and security programs for all kinds of businesses.   

David Benton, CISSP, EnCE, A+, CCPA Director of Digital Forensics, Southern US, Altep, Inc.

For the last 20 years, David has been employed in an investigative or forensics capacity for clients including the Georgia Bureau of Investigation and US Army Counterintelligence.  

Stephanie Dozier, Product Lead for Cyber/Regulatory & Management Liability, MagMutual Insurance Company

Stephanie helped develop MagMutual's program for cyber and regulatory policyholders and is the lead underwriter for the MagMutual CyberPlus Regulatory Defender coverage.   


Bill Kanich, MD, JD, Vice President and Chief Medical Officer of the MagMutual Patient Safety Institute

As CMO of the MagMutual Patient Safety Institute, Dr. Kanich is responsible for leading all clinical risk management initiatives, including all educational speaking programs. 


Want to learn more?

Interested in how MagMutual can help?

View our products


The information provided in this resource does not constitute legal, medical or any other professional advice, nor does it establish a standard of care. This resource has been created as an aid to you in your practice. The ultimate decision on how to use the information provided rests solely with you, the PolicyOwner.