In this session, HHS OCR provides an update on its latest HIPAA compliance and regulatory efforts - including possible modifications to the HIPAA rules. Then a panel of experts discusses:
Latest health data breach trends, including soaring hacker incidents;
The evolving regulatory climate and its impact on health...
What approaches are healthcare entities taking with their credentialing and IAM to better verify and manage the identities of patients, clinicians, researchers, vendors and others who want or need access to health and other critical data? Our panelists Cris Ewell, CISO at UW Medicine and Jigar Kadakia, CISO and chief...
Suzanne Schwartz, MD, Associate Director for Science and Strategic Partnerships, at the Food and Drug Administration's Center for Devices and Radiological Health, will provide an update on FDA's medical device cyber efforts. That includes the status of a draft update to the cybersecurity guidance for premarket...
The federal government says it will scrutinize healthcare providers and health IT vendors that participate in so-called "information blocking." But what are the top technical challenges and other barriers in ensuring that health information is being appropriately, legally and securely shared with clinicians, patients...
What are the new data security, patient safety and privacy worries evolving with each new cyberattack on the healthcare sector? Our panel of experts - Jigar Kadakia, CISO of Partners HealthCare; Michael McNeil, global security officer at Philips; and Chris Frenz, CISO Interfaith Medical Center - will discuss what...
Insider threat and email attack risks are a major issue in the health industry, 95% of IT executives have identified insider threats as a top concern in last 12 months, 79% think employees have put data at risk accidentally and 61% say employees have done so maliciously.
In this session will look at how...
The U.S. Department of Justice just indicted two alleged hackers in China in the highly sophisticated cyberattack on health insurer Anthem that exposed data on nearly 80 million Americans. Meanwhile, ransomware, business email compromises, intellectual property theft and other headline-grabbing breaches and...
More cloud? Definitely more goals. Healthcare technology leaders are in a constant struggle to do more with fewer resources. Is the organization's security strategy the root of the problem or an enabling factor to ensure patient safety while improving the quality of healthcare delivery? Come learn how to control the...
How do you find a needle in a haystack - whether it's a malicious insider or clues that a massive or devastating cyberattack could be underway? Our panel - including Mitch Parker, CISO at Indiana University Health System; and Jennings Aske, CISO NY Presbyterian - will discuss:
Challenges and approaches to breach,...
Many healthcare organizations today are hiring managed security service providers (MSSP) to manage specific security initiatives, or in some cases, outsourcing their entire security program. This approach is especially beneficial to those that have limited IT resources, lack internal security expertise, struggle to...
Health organizations face a wide range of new cyber security threats like crypto-jacking and IoT vulnerabilities while still facing the heavy load of compliance and basic security blocking and tackling. Security requires an end to end framework based approach to manage well against a constantly evolving threat...
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization...
In the digitally-transformed healthcare landscape, PHI is transmitted and stored in the cloud and accessed by legions of privileged users; patients now have unprecedented access to their own data and records, which are coveted by fraudsters on the Dark Web; and regulators are increasingly scrutinizing the privacy and...
With the extensive network systems found in the health care industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and...
What does it take to securely migrate nearly all your systems and data onto the cloud, phase out your own on-premises data center, and build shared cyber risk responsibility with third-parties? That's a journey under way at health insurer Wellmark. The health insurer's vice president and CISO Thien La will describe...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.