Akamai VP John Summers on the nightmare of user provisioning, access control and hackers fondness for healthcare
10:50 am December 08, 2016
(SPONSORED) John Summers, Vice President and General Manager of Enterprise at Akamai offers several suggestions relative to access control, provisioning user accounts, and engaging in agile digital transformation that also enables hospital IT departments to better serve customers. Summers also shares his vision of what healthcare organizations...
10:25 am December 08, 2016
Penetration or pen tests are an increasingly popular way to find the access points on a network that can be exploited by hackers. In his presentation at the Healthcare Privacy and Security Forum, Chris Crowley explains the value and the limits of these tests, and how to ensure that you can get the most benefit from a pen test.
09:34 am December 08, 2016
A successful cyber-security program requires a comprehensive approach. Shenny Sheth talks about the management philosophy that Texas Children’s Hospital has taken to creating its blueprint for the successful implementation of a security program.
08:09 am December 07, 2016
(SPONSORED) As the number of devices connected to a healthcare network continues to expand, so do the points of vulnerability. Many of these devices add new access points for malware that can threaten the overall security of the network. Isolation and containerization can be part of the solution.
04:45 pm December 06, 2016
By adopting best practices, IT managers can build their security strategy around a set of frameworks that have been proven to work. The IT Process Institute CEO talks about their approach to the challenge of selecting the best practices in cybersecurity.
04:20 pm December 05, 2016
Whether it's protecting against ransomware attacks, managing insider threats, implementing device management policies or convincing the C-suite to open its purse-strings, the role of a chief information security officer is a complex one.
04:09 pm December 05, 2016
In a world where cyber criminals can exfiltrate healthcare data from the other side of the globe, health systems have their work cut out for them when it comes to protecting patient information. It wasn't always this way. How did we get here?
02:54 pm December 05, 2016
(SPONSORED) Jeff R. Livingstone, global lead, life sciences & healthcare at Unisys, says not enough attention is paid to the security of medical devices, which, thanks to the increasing interconnectedness of the Intenet of Things, represent a dangerous front for cyberattacks.
11:22 am December 05, 2016
After a banner year for healthcare breaches, it's worth taking stock of where we are and what we need to do to ensure 2017 is better for cybersecurity. Darren Lacey, chief information security officer at Johns Hopkins offers his perspective on the state of the industry.
10:41 am October 26, 2016
Peggy Chou shares the journey Atrius Health took in improving the risk adjustment on its value-based reimbursement contracts. Starting with a deep analysis of its existing EHR data, Atrius began a process that included clinicians, finance and IT staff members.