What approaches are healthcare entities taking with their credentialing and IAM to better verify and manage the identities of patients, clinicians, researchers, vendors and others who want or need access to health and other critical data? Our panelists Cris Ewell, CISO at UW Medicine and Jigar Kadakia, CISO and chief...
In this session, HHS OCR provides an update on its latest HIPAA compliance and regulatory efforts - including possible modifications to the HIPAA rules. Then a panel of experts discusses:
Latest health data breach trends, including soaring hacker incidents;
The evolving regulatory climate and its impact on health...
With the extensive network systems found in the health care industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and...
What does it take to securely migrate nearly all your systems and data onto the cloud, phase out your own on-premises data center, and build shared cyber risk responsibility with third-parties? That's a journey under way at health insurer Wellmark. The health insurer's vice president and CISO Thien La will describe...
Some of the biggest health data breaches - including headliner Wall of Shame breaches in 2018 - are due to insiders who click on phishing emails, and fall for business email compromise scams. While there is also plenty of record snooping by insiders, healthcare also has its share of malicious bad actors looking to...
Following the HHS OCR presentation, a panel of CISOs and regulatory and legal experts will dig into how major health data breach trends are changing, and why. For instance:
What lessons can be learned from some of the latest breach trends, including the steady surge in reported hacker incidents
Cybercriminals,...
An inside view of what HHS OCR is seeing on the healthcare sector privacy and security landscape, and what the agency has in the works to address those challenges. That includes:
Insights from OCR's latest breach and compliance investigations of covered entities and BAs.
An update on OCR's HIPAA enforcement...
It's no secret that the healthcare industry is increasingly under attack by cybercriminals. And risky end-user behaviors are only exacerbating the threat. Yet, user awareness training is always a challenge for organizations. How do you effectively train users to stop clicking on links or opening attachments? This...
A new exploit opportunity has fallen into the laps of Cybercriminals. They have now set their sights on the virtual (and volatile) world of cryptocurrency. Since the start of 2017 various currencies have rocketed and tumbled in value - this represents a valuable new opportunity for cybercriminals to increase their...
Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify...
Breaches and other cyber incidents involving business associates and other vendors can have a devastating impact. What can healthcare sector entities do to reduce and better manage those risks? Our panel of CISOs and other experts will explore:
The growing risks posed by vendors
Challenges involving cloud vendors...
What are healthcare entities doing to better position themselves for battle in the evolving cyber threat landscape? CISOs discuss what they're doing with their SOC, SIEM, behavioral analytics, virtual desktops, endpoint protection, and more.
In this session, panelists will discuss:
The key vulnerabilities putting...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.