Healthcare Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Analysis: The Latest Ransomware Targets

    20/12/2019

    The latest edition of the ISMG Security Report discusses the recent ransomware attacks on the city of New Orleans as well as other units of local government and schools. Also featured: discussion on security issues for IoT and legacy medical devices.

  • Why Securing Medical Devices Is So Challenging

    17/12/2019

    Improving the security of diverse medical devices is a major challenge for a variety of reasons, according to security leaders at two device manufacturers, who spell out the key issues in this interview.

  • Analysis: A Better Approach to Cyber Defense

    13/12/2019

    The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections.

  • Reflections on Cloud Strategies & Security

    12/12/2019

    How does one make cloud a prominent part of enterprise security strategy? Is the cloud inherently more secure than on-prem? These were among the discussion points of a recent Dallas executive roundtable. Alex Pitigoi of Nominet shares her takeaways from the event.

  • Cyber Confidence: Why it Matters

    12/12/2019

    ISMG and Nominet recently hosted a NYC roundtable discussion on the topic of cyber confidence. Dave Polton of Nominet reflects on the key takeaways and why cyber confidence is now one of the sector's hottest topics.

  • Quantum-Proof Cryptography: What Role Will It Play?

    10/12/2019

    CISOs need to begin investigating the use of quantum-proof cryptography to ensure security is maintained when extremely powerful quantum computers that can crack current encryption are implemented, says Professor Alexander Ling, principal investigator at the Center for Quantum Technologies in Singapore.

  • AI, Machine Learning and Robotics: Privacy, Security Issues

    06/12/2019

    The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.

  • How the Adversarial Mindset Is Making Cybersecurity Better

    06/12/2019

    Applying offensive hacking expertise and a more adversarial mindset to better hone not just network defenses but also public policy is proving effective, says Jeff Moss, founder and creator of the Black Hat conference.

  • Analysis: Smart TV Risks

    06/12/2019

    The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.

  • John Halamka on Privacy, Security of Mayo Clinic Platform

    05/12/2019

    In an in-depth interview, John Halamka, M.D., the former long-time CIO at Beth Israel Deaconess Medical Center in Boston, discusses his upcoming move to head Mayo Clinic's global digital health initiative in collaboration with Google - and why privacy and security are so critical to those efforts.

  • PSD2: The Compliance and Enforcement Update

    04/12/2019

    The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.

  • Digital Transformation: The Privileged Access Imperative

    04/12/2019

    As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.

  • Banking on Mobile Security

    04/12/2019

    What are the key mobile security threats to financial organizations, and how are these enterprises marshalling their mobile threat defense? These were the questions posed by ISMG and Wandera to security leaders in San Francisco. Wandera's Michael Covington discusses the response.

  • Analysis: Vendor Contract Changes Under CCPA

    03/12/2019

    Getting the proper vendor contracts completed is a top concern for organizations preparing to comply with the California Consumer Privacy Act, says Caitlin Fennessy, research director at the International Association of Privacy Professionals.

  • The Threat of Ransomware and Doxing

    29/11/2019

    The latest edition of the ISMG Security Report discusses new combination ransomware and doxing attacks. Plus, Twitter drops phone numbers in 2FA, and why we need to consider quantum cryptography today.

  • Medical Device Cybersecurity: A Team Approach

    27/11/2019

    All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.

  • Election Hacking: What You Need to Know

    25/11/2019

    Election hacking is not just a US issue; it's a hot topic for every global democracy. And Joseph Carson of Thycotic is concerned that too many people are focused on the wrong elements of this topic. He analyzes the specific hacking techniques that demand attention.

  • Analysis: The Latest Ransomware Trends

    22/11/2019

    This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

  • A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

    21/11/2019

    Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

  • Taking Advantage of EMV 3DS

    19/11/2019

    Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

página 38 de 171