Skip to main content

Cybersecurity

Cybersecurity
By HIMSS TV | 11:55 am | October 30, 2018
Jane Harper, Director Privacy & Security Risk Management at Henry Ford Health System, discusses how third party risk management should be viewed like a romantic relationship – from the dating stage through the prenup, marriage, and even divorce.
Cybersecurity
By HIMSS TV | 02:55 pm | October 23, 2018
Developing a better link between cybersecurity and patient-facing services is what Dan Taylor, director of security of NHS Digital, believes is a top priority – a good cybersecurity strategy focused on people.
Cybersecurity
By HIMSS TV | 10:33 am | October 18, 2018
Kirk Lippold, commander of United States Navy (RET), explains how intellectual honesty requires a commitment to sit down with people in the organization to review what happened after a crisis and find a new normal.
Cybersecurity
By HIMSS TV | 03:14 pm | October 17, 2018
Despite the healthcare sector’s awareness of medical device flaws, many are still focused on whether a patient has been harmed. But to UC San Diego researcher, emergency medicine provider Christian Dameff, MD, it’s more about retaining patient trust and ensure the technology doesn’t fail.
Cybersecurity
By HIMSS TV | 03:12 pm | October 17, 2018
Brian Selfridge, partner at IT Risk Management for Meditology, also explains the evolving role of infosec leaders in the healthcare sector – including third-party vendor management.
Juniper
By HIMSS TV | 03:05 pm | October 17, 2018
Johns Hopkins Medicine CISO Darren Lacey shares his thoughts on the sector’s inherent problems, ransomware, remaining positive amid those threats and ways to keep up with hackers.
Juniper
By HIMSS TV | 10:40 am | October 16, 2018
Chad Wilson, director of information security at Children’s National, explains how timely access to applications in a healthcare setting is measured in seconds so the balance between usability and security is a big challenge.
Cybersecurity
By HIMSS TV | 10:17 am | October 16, 2018
Theresa Payton, president and CEO of Fortalice Solutions, explains how to avoid digital disasters with a segmentation strategy that includes on-going testing with data, equipment and third-party vendors to put security assumptions to the test.
Security
By Eric Bailey | 11:18 pm | May 14, 2017
Jamie Lam, data security compliance manager for the University of California at San Francisco School of Medicine offers tips for managing "shadow IT" as tech-savvy employees find their own ways to work effectively.
Security
By Eric Bailey | 11:13 pm | May 14, 2017
Matt Trevors, a senior member of the technical staff with the CERT Division of the Software Engineering Institute at Carnegie Mellon University, offers help for meeting the HIPAA Security Rule.

Newsletter Signup