Privacy
contact tracing
The Norwegian Institute of Public Health will delete all collected data and suspend operations to address security concerns.
Security
Jamie Lam, data security compliance manager for the University of California at San Francisco School of Medicine offers tips for managing "shadow IT" as tech-savvy employees find their own ways to work effectively.
Security
Matt Trevors, a senior member of the technical staff with the CERT Division of the Software Engineering Institute at Carnegie Mellon University, offers help for meeting the HIPAA Security Rule.
Privacy
Kevin Fu, associate professor of computer science and engineering at the University of Michigan, sees historic parallels with our current cybersecurity moment.
Security
Sharon Klein, partner in the Health Sciences Department of Pepper Hamilton, offers tips for audit preparedness, business associate agreements, cyber insurance and more.
Security
M.K. Palmore, FBI assistant special agent in charge of San Francisco's Cyber Branch, also describes a fast-evolving threat landscape, explains cyber criminals' focus on ROI and discusses the emerging security trends that concern him the most.
Video
Bruce James, director of cybersecurity architecture at Intermountain Healthcare, discusses its approach to identity and access management, explains its recent focus on patient-centered IAM systems and offers some best practices for other healthcare providers to follow.
Security
Jane Harper, director of privacy and security risk management at Detroit's Henry Ford Health System, discusses the dangers of giving short shrift to risk management, which she says is evolving quickly as it feels the impact of consumerism.