Skip to main content

Privacy & Security

SPONSORED Privacy & Security
By Amazon Web Services (AWS) | 01:00 pm | May 02, 2018
US healthcare reform, increasing patient expectations, exponential data growth, and the threat of cyber attacks are forcing healthcare providers to re-evaluate their data management strategies. Healthcare providers are responding to these demands by leveraging Amazon’s AWS Cloud to enforce lifecycle management, employ cost-effective, scalable storage and un-trap data for operational and quality insights.  Join Amazon’s healthcare webinar to learn about key benefits, design considerations, and AWS partner solutions for making optimal investments in healthcare.
SPONSORED Privacy & Security
By Ping Identity | 03:52 pm | April 19, 2018
This informative whitepaper offers details about a platform offering a solid identity and access management (IAM) foundation to help hundreds of healthcare payers, providers and life sciences organizations achieve better experiences and outcomes.
SPONSORED Privacy & Security
By | 04:12 pm | April 18, 2018
Identifying gaps with respect to HIPAA mandates and figuring out where to start can be a daunting process. As part of regularly reviewing your safeguards to ensure sensitive patient information is protected, this checklist offers expert guidance.
SPONSORED Privacy & Security
By | 02:00 pm | April 12, 2018
Learn about PCI-validated Point-to-Point Encryption (P2PE) to secure patient payment data, rendering it useless to hackers with the highest level of encryption available.
SPONSORED Privacy & Security
By | 03:30 pm | April 11, 2018
Despite network security's recognized importance, many organizations remain vulnerable due to networked devices such as printers and scanners. As this paper shows, solely perimeter-based security is not enough to protect the company's critical data.
SPONSORED Privacy & Security
By | 11:00 am | March 29, 2018
The healthcare industry faces increased attacks from cybercriminals, and risky end-user behaviors are only exacerbating the threat. A new report from Wombat Security, State of Security Education: Healthcare, helps organizations understand the knowledge gaps that affect their security postures and increase risk. Join us for a deep-dive webinar that explores end-user data specific to the healthcare industry. We will analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of simulated phishing attacks
SPONSORED Privacy & Security
By Oracle | 12:00 pm | February 28, 2018
Care and reimbursement models are changing.  Patient expectations are increasing.  New technologies are emerging…Healthcare is transforming.  This webcast will discuss how successful Healthcare organizations are reducing care cost while improving care quality and transitioning to value based care with Cloud Infrastructure and Platform Services.
SPONSORED Privacy & Security
By | 01:00 pm | February 26, 2018
The ability to be mobile and seamlessly access the right patient’s record at the right time is paramount for today’s mobile patients and the clinicians who must depend on technology to help determine correct diagnosis, treatment and medication dosage. The seamless, accurate exchange of health information with other care providers affiliated with a patient’s care (e.g. primary care physician, specialists, the lab, the pharmacy, radiology, etc.) is key. Given that mobility is one of the primary drivers for health information exchange (HIE), it takes an advanced patient ID solution to ensure the delivery of the right treatment to the right patient at the right time, based on the right exchange of patient data.   This webinar will address how the ability to accurately access patient records anywhere across the healthcare enterprise and the ability to leverage positive patient ID technology must correlate in order to improve care delivery and reduce the potential for medical errors, which ultimately put healthcare delivery organizations at grave risk from a clinical, quality and regulatory compliance standpoint and inhibit the path to value-based care. It will also highlight how the need to identity proof the various stakeholders in patient care has been increasing in importance over the past few years, what that means, and how, for some healthcare organizations, identity proofing has been seen as a way to help deter medical identity theft among their patient population.  
After the Breach: The Fine is the Easy Part
SPONSORED Privacy & Security
By | 01:00 pm | February 22, 2018
In this talk, we will detail a recent example of an OCR Corrective Action Plan (CAP) in which a healthcare practice was required to leverage dedicated resources to follow complex, time-sensitive steps that disrupted regular business activities.
cybersecurity threats
Privacy & Security
By Dan Costantino | 09:08 am | February 19, 2018
After all the cybersecurity threats and events in the last 12 months, infosec teams should focus on these priorities as they craft strategies into the future.