An overview of identifying vulnerabilities in an entity’s healthcare information system, with examination of case studies and consideration of the legal and regulatory background. Special attention will be given to technical safeguards and social engineering. This talk will also discuss steps to take in the investigation of a suspected HIPAA breach.