It’s the old preconception that’s kept security out of the equation for far too long – if cyber gets involved, the whole project is dead, or at least not going anywhere fast. Luckily that dynamic is falling by the wayside, as business leaders have to come to realize that not including security means taking on […]
Healthcare is complicated. So it’s not surprising that healthcare cybersecurity is just as complex. But what shouldn’t be complicated is the guidance health systems are given to deal with threats. In the past, a number of well-meaning entitles – from government to private to hybrids of the two – have put out roadmaps, frameworks and […]
Healthcare is abuzz with talk of artificial intelligence. And when it comes to cybersecurity, that buzz both has to do with how the bad guys are going to use it, and how the good guys can apply it to defense. But Ryan Witt, VP, Industry Solutions, Healthcare, Proofpoint, warns that today, the time of small- […]
In an effort to better engage with patients, many health systems have gotten themselves into a pickle by going overboard. Today, with almost every department running its own patient engagement efforts, those at the end of all that attention are feeling overwhelmed. But there’s a better way, and it starts with governance, according to Guillaume de Zwirek, CEO, Artera.
It’s the foundation of any care access experience offered by a health system or hospital. Provider data powers a myriad of experiences that impact patients, providers, and staff members enterprise-wide. Unfortunately, the many back-end systems that house this data are often out of date and inconsistent, leading to a disjointed experience as people seek to access this information across an organization. Leading IT executives have found that investing in a provider data management strategy can help solve many of the data-oriented challenges they face today, enabling them to create a better experience for patients looking to schedule care and free-up time for employees tasked with keeping this often-changing information up to date. In this webinar we’ll hear from leaders who are focused on improving this critical area of patient engagement and, with it, how they’re driving innovation and operational efficiency.
When Skip Sorrels, Director of Cybersecurity with Ascension Health, tells a clinician who may be frustrated with IT that he knows what they are going through, he means it. That’s because, in a past life, Sorrels served as an ICU nurse before moving to cyber. As such, he understands what it’s like to have a […]
If burglars were consistently entering houses in your neighborhood though the back door, it wouldn’t make much sense to spend the majority of your home defense budget fortifying the windows. According to Ryan Witt, VP of Industry Solutions, Healthcare, for Proofpoint, figuring out where to spend your cybersecurity budget should work much the same way. And speaking of healthcare, he notes that the more things change, the more they stay the same, with phishing consistently being a top attack vector for the past decade. Why? According to Witt, because it works. But there are ways to give you a better chance of fending off the bad guys. In this interview with healthsystemCIO Founder & Editor-in-Chief Anthony Guerra, Witt talks about some strategies for defense, what to do (and not do) post credential compromise, and why convincing users that IT security is on their side is so important.
Cybersecurity in healthcare is at a tipping point, poised to move from the voluntary to the mandatory, although not quite yet. For now, it’s still up to organizations as to whether not they want to comply with any specific framework or set of best practices. Of course, demonstrating adherence to 405(d)’s HICP should get some […]
IT executives have always had a challenging time ensuring their users were operating securely; but since the Covid pandemic larger workforce trends have seen those challenges multiply. Those trends include fully remote work, a gig economy that sometimes involves the use of short-timers like traveling nurses, and an overall trend of higher turnover and staff fluidity. In such an environment, it’s no wonder that insider threats are top of mind for security professionals. So how can CIOs and CISOs make sure a fox hasn’t made it into the hen house, or even that unintentional but inappropriate access is identified and addressed? In this timely webinar, we’ll hear from leaders who are leveraging technology, governance and relationships to ensure that a fluid workforce doesn’t equate to a high risk one.
It’s been said by many a CISO that they essentially function as the chief risk officer. What they are trying to say, of course, is that the job is all about understanding and communicating cyber risk. Interestingly Jacki Monson – currently Chief Integration Officer, CISO & Chief Privacy Officer at Sutter Health – once also […]