Welcome! How can we help you improve your cyber posture?

Why tw-Security?

Leadership. tw-Security is a nationally recognized leader in healthcare cybersecurity, data privacy, and compliance.

Our customers come first. We succeed when you succeed. We value your time. 

Stability. tw-Security is a privately held, partner-owned company that has been in business since 2003.

Vendor-neutral. We are not a reseller of products or services.

We are results-driven. We follow an ‘outcomes’ driven methodology to define, measure, and report project progress that drives on-time, on-budget results.

Contact tw-Security to help you identify and mitigate risk!

Cybersecurity

tw-Security’s scalable solutions result in a prioritized “road map” to document that identified risk and compliance deficiencies are being addressed and corrected, as part of the risk management process. Now is the time to conduct an enterprise risk analysis and advance your program’s maturity – contact tw-Security.

Compliance

tw-Security has experience with multiple regulatory requirements, standards, and frameworks. This includes HIPAA, PCI DSS, NIST Cybersecurity Framework, ISO 27002, SOC2 Type 2, and CSA Section 405(d) HICP (Health Industry Cybersecurity Practices.) We help you create your “Book of Evidence” – contact tw-Security.

Data Privacy

Information is an organization’s most nonhuman valuable asset. The data privacy program includes protected health information (PHI), proprietary and confidential organizational data, and Personal Identifiable Information (PII). To update your policies, training, and enhance your data privacy program – contact tw-Security

Breaches: By the Numbers

Q3 2020 - Hacking and unauthorized access continue to trend as highly significant figures in large reported cyber breaches this quarter. The FBI and others warn that healthcare is being increasingly and imminently targeted by ransomware attacks, in which cybercriminals use malicious software to encrypt vital data and then demand payment for a decryption key. See our detailed report for Q3 breach statistics. Engage tw-Security to determine if your organization is protected against cyber threats.

0

%

Hacking

0

Unauthorized Access

0

Data Thefts

0

Patients Affected

NEED HELP QUICKLY?

    LOOKOUT FOR OUR REPLY

    Areas of Expertise

    Our mission is to provide you with consulting services with a focus on integrity, quality, and consistency. Our services are grounded in the guiding principles that information security is the cornerstone to maintaining the public trust; that it is primarily a business issue, not just a technology issue; and that it should be risk-based, cost-effective, and aligned with your priorities, industry-appropriate practices, and relevant regulatory requirements. Multiple services are offered within the following "Areas of Expertise."

    tw-Security Cybersecurity and Data Privacy Programs Framework Defines Our Services.

    Let's start a conversation using our integrated program framework diagram.

    ENVISION - IMPLEMENT - OPERATE

    Our cybersecurity and data privacy program framework integrates the evaluation and security management processes, with elements of prevention, detection, and response services.

    These elements combine best practices with situational awareness to address the people, process, and tool dynamics of cybersecurity and data privacy programs.

    To reduce the likelihood of security incidents and data breaches, programs are designed for specific cyber-threats and environments.

    Meet our leadership team

    We have the hands-on experience you need to meet tomorrow’s data security challenges today.

    Tom Walsh <br> CISSP
    Tom Walsh
    CISSP
    Founder and
    Managing Partner
    Read Bio
    Kerry McConnell <br>  CISSP
    Kerry McConnell
    CISSP
    Partner,
    Principal Consultant
    Read Bio
    Keith Fricke, MBA <br>  CISSP, PMP
    Keith Fricke, MBA
    CISSP, PMP
    Partner,
    Principal Consultant
    Read Bio
    Mark Dill, CISM, CRISC <br>  Cybersecurity Auditor
    Mark Dill, CISM, CRISC
    Cybersecurity Auditor
    Partner,
    Principal Consultant
    Read Bio
    Fran Hunter <br> Partner
    Fran Hunter
    Partner
    Partner, Business Development
    and CustomerCare
    Read Bio

    Who we serve

    We focus on the healthcare industry – both large and small.

    Our roster of over 175 customers represents a diverse cross-section of healthcare and related industries.

    Our healthcare hospital customers range from academic medical centers to critical access hospitals.

    We also serve specialty hospitals, freestanding ambulatory sites, and practice management organizations.

    Our customers include start-up business associates to mature software/service vendors.

    We assist universities with HIPAA-compliant programs and student health centers.

    We are called on to provide expert witness services.

    Professional organizations reach out to us for expertise, knowledge transfer, and advisory services.

    Put your trust in us

    Both professional organizations and industry professionals trust our insight.

    For over 20 years, our trusted advisors have shared their perspectives, insights, and observations on “top of mind” healthcare topics and trends with journalists and media professionals for a number of industry publications.

    To read what we've shared, visit TRUSTED ADVISOR - In The News section.

    Our experts have authored many influential articles and features, actively participate in professional organizations, and have shared their expertise in numerous seminars and presentations.

    Thought Leadership

    Tw-Security publishes technical and editorial content that addresses the entire spectrum of data cybersecurity.

    PDF: Title TBD
    PDF: Title TBD
    PDF: Title TBD
    PDF: Title TBD
    PDF: Title TBD
    PDF: Title TBD

    Trending Topics

    We’re often called on to collaborate and share expertise with industry, academia, and the media.
    Here’s what we’re reading—and writing—today:

    The following highlights best practices to protect yourself and your organization. What should healthcare entities be doing today to prevent/defend...

    Read More

    How important is risk analysis? The HIPAA Security Rule is flexible, scalable, and technology-neutral making it open for interpretation. How...

    Read More

    What should IT security professionals consider regarding the impact of COVID-19 on breach activity and the types of breaches reported...

    Read More

    Here’s what people are saying:

    COO, Cloud Software Vendor
    Risk profile work product - "Great document by the way, very easy to digest."
    CIO, Academic Medical Center
    tw-Security has been our ‘go-to source’ for interim CISO services, risk assessments, investigative projects, strategic planning, Meaningful Use confirmation, and reporting to OCR.
    Clinical Informatics Specialist & Privacy Officer, Specialized Treatment Centers
    I’m so happy you guys are working with me and getting us set up with policies and procedures that comply with the HIPAA Security Rule. I sleep so much better.
    HIPAA Privacy-Security Officer, Community Hospital
    Thanks for all you do in spreading the HIPAA gospel, and helping us all learn in a way that is so understandable and memorable.
    Chief Strategy Officer, Predictive Modeling Vendor
    Thanks for the super fast turn around. I expect nothing less from "the undisputed heavy weight champions of the wooooooorrrrrrrrllllllldddd!!
    Information Security Officer, Integrated Delivery Network
    We were especially pleased with the detailed review of our policies – no other consulting firm had ever provided that level of useful feedback.
    CEO and Founder, Patient Care Business Associate
    We are extremely satisfied with tw-Security helping get our HIPAA programs off to a solid start and the ongoing guidance to help us keep on track.
    CEO, Specialty Hospital
    This Risk Management Report looks very good and is easy to read and understand.

    Looking for more inspiration?

    Stay up to date!

    We only use your e-mail address to send you the best tips about tw-Security. You can always unsubscribe using the link in the e-mail.

    Loading