Headshot of Yan Kravchenko

Yan Kravchenko

Yan has performed and managed numerous security assessment and IT audit projects in the education, government, healthcare, manufacturing, and agriculture sectors. A particular focus recently has been information security in healthcare. Yan has over 14 years of consulting experience in Information Technology and Information Security, specializing in security program development and management, security assessments, and IT audits.

More by Yan Kravchenko

Vulnerability Management

An Introduction to the Open Software Assurance Maturity Model (OpenSAMM)

The Open Software Assurance Maturity Model (OpenSAMM) was developed by OWASP and is comprehensive in nature, covers all aspects of application security, and still allows each application to be evaluated in under one hour.

Learn More
Mobile Application Pentesting

Mobile Application Threat Modeling

Perform a threat assessment for mobile applications, whether developing a new app or reviewing an existing one. Pentesting essential insights shared.

Learn More
Vulnerability Management

Things not to overlook in the new PCI DSS 3.0

This post highlights some of the most significant, noteworthy, and understated changes in the new PCI DSS 3.0.

Learn More
Vulnerability Management

DEA Electronic Prescription of Controlled Substances – Certification Clarification

On October 16th, 2011 the DEA released a series of clarifications regarding the requirements for Electronic Prescriptions of Controlled Substances (EPCS). Let's discuss.

Learn More
Vulnerability Management

Mayo Clinic's Solution for Social Media Challenges

The Mayo Clinic recently launched Mayo Clinic Center for Social Media intended to help train medical practitioners and patients about the use of social media to improve patient care.

Learn More
Vulnerability Management

Security and Privacy Considerations in "Meaningful Use"

One of the common and consistent themes at HIMSS (Healthcare Information and Management Systems Society) this year was achieving "Meaningful Use" requirements so that healthcare providers can apply for EHR (Electronic Health Record) stimulus money.

Learn More
Cloud Pentesting

EMR Security in the Cloud

I recently had the opportunity to review an article by Michael Koploy of Software Advice titled "HHS Data Tells the True Story of HIPAA Violations in the Cloud".

Learn More
Vulnerability Management

HIPAA May not Protect Compulsive Liars

At a recent networking event I heard a manager express frustration over managing an employee who got caught up in her own fairy tales that resulted in a very embarrassing termination.

Learn More
Vulnerability Management

Does DLP Help Solve HIPAA Concerns?

One of the most promising technologies for automatically enforcing compliance with sensitive data handling practices is Data Loss Prevention (DLP) technology and it is quickly gaining popularity and adoption across many industries.

Learn More
Vulnerability Management

Business Associates Need to Understand HIPAA & HITECH Requirements

 Even though the full extent of the HIPAA and HITECH requirements will not be required for Business Associates until 2011, my experience with helping organizations reach compliance with appropriate security requirements suggests that compliance efforts should begin right away.

Learn More
Vulnerability Management

HITRUST Part 4 Looking Forward

In this conclusion of the HITRUST blog series, I would like to discuss some definite opportunities and challenges that HITRUST is likely to face.

Learn More
Vulnerability Management

HITRUST Part 3 Certification Explained

As a continuation of the HITRUST blog series, in this post I would like to explore the concept of certification, and what it means.

Learn More