The key to having a solid cybersecurity strategy? Recognizing that there’s no such thing as a “fully protected” organization, and having the agile mindset needed to pivot when necessary, says CIO and CISO Steven Goriah.
Although they offers great potential in terms of streamlining workflow and improving the patient experience, IoMT devices also present a new list of concerns, according to our panelists, who discussed the challenges in securing network-connected devices and offered best practices.
Solid leads can be so difficult to obtain; is it that big of a deal for security companies to utilize potentially shady marketing techniques? Yes, says Mitch Parker, Executive Director of IS and Compliance at Indiana University Health. Here’s why.
“The work we do in public policy is so important, because we can drive substantial change,” says CIO Theresa Meadows, who talks about the value of advocacy, the biggest challenges in cybersecurity, and why Meaningful Use was a game-changer.
It’s not just about building and configuring an EHR system, but providing the right training and support, and making sure IT can work with clinicians to make sure it’s being used optimally, says Steven Goriah.