healthsystemcio.com

healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  • About
    • Our Team
    • Advisory Panel
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advertise
  • Partner Perspectives
  • Subscribe
  • Webinars
    • 4/6-Improving Data Quality
    • 4/13-Staying Trained on Key Apps
    • On-Demand Webinar Library

  • About
    • Our Team
    • Advisory Panel
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advertise
  • Partner Perspectives
  • Subscribe
  • Webinars
    • 4/6-Improving Data Quality
    • 4/13-Staying Trained on Key Apps
    • On-Demand Webinar Library
The best security professionals have always focused on empowering rather than restricting. However, securing today’s work-from-anywhere workforce is putting that noble goal to the test. That’s because working from home (or anywhere other than locations owned by the organization) opens up a can of security worms and questions, such as are folks more susceptible to ransomware and BEC social engineering attacks because the comfort of their own homes naturally lowers their guard?

Securing the Expanded Attack Surface Created by a Remote Workforce

New Webinar took place 7/14/2022

https://media.blubrry.com/healthsystemcio/content.blubrry.com/healthsystemcio/220714_Securing_Remote_Workers-IGEL-AUDIO-AU.mp3

Podcast: Play in new window | Download (Duration: 57:14 — 39.3MB)

The best security professionals have always focused on empowering rather than restricting. However, securing today’s work-from-anywhere workforce is putting that noble goal to the test. That’s because working from home (or anywhere other than locations owned by the organization) opens up a can of security worms and questions, such as are folks more susceptible to ransomware and BEC social engineering attacks because the comfort of their own homes naturally lowers their guard? Can, for example, running downstairs to change out the laundry mean your 10 year old will jump on your laptop and click away? Of course, the implications of that happening vary based on whether the end point in question is a work laptop or personal device, and how it’s secured. In this important webinar, we’ll talk to IT leaders about how they balance the need to empower with the need to secure in today’s post-pandemic environment.

Sponsored by

Continuing Education Credits: Attendees who hold the CHIME CHCIO certification earn 1 CEU. Attendees who hold the AEHIS CHISL certification earn 1 CEU for attending security-focused Webinars. Other programs — such as those offered by AHIMA and NAHQ/HQCC — may also award CEUs. Check with your provider.
a
On-Demand Webinar Library
Subscribe to Learn of Future Events
Advertising & Marketing Services
Share

Content by Topic

Partner Sponsors

 

 

 

 

 

 

 

 

 

 

 


 

 

 

 

 

 

 

 

 


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2023 HealthsystemCIO.com.