Healthcare Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Why Synthetic Identity Fraud Persists

    15/02/2021

    Julie Conroy of Aite Group and Shai Cohen and Lee Cookman of TransUnion analyze a new report that explains why synthetic identity fraud poses a long-term threat.

  • Analysis: Implications of Water Treatment Plant Hack

    12/02/2021

    The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant. Also featured: The CISO of the World Health Organization discusses supply chain security; hackers steal celebrities' cryptocurrency.

  • Data Sharing: The Need for Transparency

    08/02/2021

    Mobile app and other technology vendors must clearly communicate to users how their sensitive health data will be shared with third parties - especially those in China and other nations. Otherwise, they face potential regulatory scrutiny as well as privacy lawsuits, says regulatory attorney Ashley Thomas.

  • Account Takeover in 2021 - and How to Prevent It

    05/02/2021

    SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.

  • Analysis: The Persistent Ransomware Threat

    05/02/2021

    The latest edition of the ISMG Security Report features an analysis of the persistent threat of ransomware. Also featured: Sorting out breaches tied to Accellion’s File Transfer Appliance; an update on fraud trends in 2021.

  • Analysis: Emotet and Netwalker Takedowns

    29/01/2021

    The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology.

  • Tips on Securing Endpoints, Ensuring Compliance

    27/01/2021

    Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject.

  • Analysis: How Will Biden Address Cybersecurity Challenges?

    22/01/2021

    The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic.

  • Putting New PACS Guidance to Use

    19/01/2021

    Recently released NIST guidance aims to help healthcare providers better address the security risks posed by picture archiving and communication systems. Michael Holt, a contributor to the document, describes how to put the guidance to use.

  • Is a US National Privacy Law on the Horizon?

    18/01/2021

    The prospects for passing a U.S. privacy law will improve under the Biden administration, predicts attorney Kirk Nahra, who offers a legislative outlook.

  • SolarWinds Supply Chain Hack: Investigation Update

    15/01/2021

    The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.

  • Securing the New 'Branch Office'

    11/01/2021

    The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.

  • Analysis: The Latest SolarWinds Hack Developments

    08/01/2021

    This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.

  • Setting Third-Party Risk Management Priorities

    07/01/2021

    Based on cyber insurance claims they file, small and midsized vendors potentially pose substantial security risks, so their customers should make them a third-party risk management priority, says consultant Mark Johnson, a former healthcare CISO.

  • Analysis: Permitting Cybersecurity Donations to Physicians

    04/01/2021

    New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson.

  • Providing Patients With Records Access: Overcoming Challenges

    31/12/2020

    As federal regulators intensify their focus on compliance with requirements to provide patients with access to their health information, healthcare organizations need to sort through a variety of emerging challenges, says health information management and privacy expert Rita Bowen.

  • Cybersecurity Leaders Talk Tactics, Techniques, Challenges

    31/12/2020

    The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.

  • Shaping the Future of Payments and Identity

    30/12/2020

    Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.

  • Telehealth: Emerging Security Concerns

    30/12/2020

    The growth in the use of telehealth during the COVID-19 crisis means that healthcare providers must carefully reassess and bolster the security of the connected devices, applications and systems used, says Kelly Rozumalski of the consultancy Booz Allen Hamilton.

  • Protecting Healthcare Data Integrity

    29/12/2020

    In the year ahead, healthcare organizations must be prepared to face an assortment of advancing security threats, including those that damage the integrity of critical patient data, says Rod Piechowski of the Healthcare Information and Management Systems Society.

página 27 de 170