Healthcare Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • 'Five Eyes' Intelligence Agencies Discuss Strategies

    03/05/2019

    The latest edition of the ISMG Security Report describes a discussion among "Five Eyes" intelligence agencies at the recent CyberUK conference. Plus, an update on a Huawei 'backdoor' allegation and new research on managing third-party risk.

  • Assessing the Cyber Threat Landscape

    02/05/2019

    The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup. Trend's Greg Young shares insight from this report.

  • What's in HHS' New Plan for Nationwide Health Data Exchange?

    01/05/2019

    What are the key privacy and security requirements proposed in the latest draft of the Trusted Exchange Framework and Common Agreement issued by federal regulators to promote nationwide secure health data exchange? Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains.

  • Managing Third-Party Risks in a New Era

    01/05/2019

    How far does an organization's risk surface extend, and who are the custodians of all that data? A new research report aims to answer those questions. In a joint interview, Kelly White, of RiskRecon and Wade Baker of the Cyentia Institute offer an analysis.

  • Malware: The Evolution of Exploits and Defenses

    30/04/2019

    The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes Labs talks about the evolution of ransomware and other successful exploits.

  • Identity Management: Finding Common Ground

    29/04/2019

    Access risk: Security leaders understand their governance and technology challenges. But addressing them with new automated tools - and selling these new processes within their organizations? Those are the problems attendees attempted to solve at a recent dinner in Philadelphia.

  • Vendor Risk Management: A Better Approach

    26/04/2019

    The risks posed by third-party vendors are a top concern for Aaron Miri, CIO of University of Texas at Austin's Dell Medical School and its affiliated UT Health Austin group practice. He explains steps he's taking to help mitigate those risks.

  • Privacy Peril: Facebook's Marketplace Flaw

    26/04/2019

    The latest edition of the ISMG Security Report describes how a Facebook Marketplace glitch created serious privacy issues. Plus: An update on the activities of the FBI's Recovery Asset Team and HSBC whistleblower Everett Stern's preview of keynote address at upcoming ISMG Fraud and Breach Summit in Chicago.

  • HSBC Whistleblower: Fraud Fight Still Has Long Way to Go

    24/04/2019

    Everett Stern, the whistleblower who called attention to HSBC's international money laundering activities, which ultimately resulted in a $1.9 billion fine, says the crackdown on financial fraud still has a long way to go. He'll be the keynoter at ISMG's Fraud and Breach Summit in Chicago on May 14.

  • A CISO Lists Top Governance Challenges

    22/04/2019

    What are some of the toughest information security governance challenges healthcare organizations face? CISO Afzal Bashir discusses key insights based on his experience.

  • The Dangers of Unsecured Medical Devices

    19/04/2019

    Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that medical device network connections are properly managed, monitored and secured is "much like keeping a weapon in a safe with the safety on."

  • Not So 'Smart' - Child Tech Has Hackable Flaws

    19/04/2019

    A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.

  • Defending Against Authorized Push Payment Fraud

    16/04/2019

    The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.

  • 'Alexa, Are You HIPAA Compliant?'

    16/04/2019

    Boston Children's Hospital is pioneering the use of Amazon's Alexa voice assist technology in the healthcare sector. John Brownstein, the hospital's chief innovation officer, discusses the security measures involved.

  • Raising the Bar on Browser Security

    16/04/2019

    When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.

  • Privacy and Security: Finding the Balance

    15/04/2019

    In the past, the relationship between cybersecurity and privacy has been uneasy and even ill-defined. But today, in the post-GDPR era, the relationship is clear, and so is the legal and compliance path forward, says David Ruiz of Malwarebytes.

  • Another Scathing Equifax Post-Breach Report

    12/04/2019

    The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.

  • Women in Cybersecurity: A Progress Report

    10/04/2019

    Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.

  • Planning for Financial Impact of Data Breaches

    08/04/2019

    Healthcare organizations need to plan ahead for the financial burden of data breaches stemming from cyberattacks and also take preventive steps to help minimize those expenses, says attorney Laura Hammargren of the law firm Mayer Brown.

  • Analysis: The Evolving Ransomware Threat

    05/04/2019

    The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.

página 47 de 171