It’s the dirty little secret among healthcare cyber professionals — they don’t know where all their ePHI is; not even close. And while those professionals are not to blame (healthcare workflows and, thus, data flows are messy business); they do have to get their arms around the problem. The first step? Understand it. In this unique webinar, we’ll explore the results of a Ponemon study on the state of ePHI in healthcare to learn just how bad the problem is and where the data might be. Then, we’ll explore ways to secure it and, in the process, hopefully give cyber professionals one less reason to be up at night.
healthsystemCIO.com
Breaking from Tradition: Q&A with Heather O’Sullivan, President, Healthcare at Home, Mass General Brigham
With the right strategy and partnerships in place, there’s a way to “address the health system’s key challenges around capacity constraints while emphasizing patient comfort and privacy,” said Heather O’Sullivan, President of the Healthcare at Home Division at Mass General Brigham. In a recent interview, she talked about what it takes to break with tradition and establish a new model for care delivery.
Designing Cyber Recovery Strategies for Today’s Data-Heavy Enterprise
Savvy healthcare IT security professionals are as focused on an efficient recovery if something goes down as they are on keeping the enterprise up. And to be positioned for success around recovery, it’s imperative business continuity plans are right sized to address the large amounts of data that health systems are amassing every day. In this timely webinar, we’ll speak to leaders who know that — with such growth — the data-protection approach of yesterday may not work for today, let alone tomorrow. We’ll explore the policies, procedures, governance and technologies they are putting in place so that if things go down, they can be back up and running as soon as possible.
Developing a Patient Engagement Strategy that Avoids Vendor Sprawl
For a whole host of reasons — security, cost and interoperability to name a few — heath systems are looking to shrink the number of vendor/partners they work with. To that end, hospitals have launched application rationalization efforts seeking to retire one-offs or little used apps, along with raising the bar to bring in new ones. One area where this effort has run into challenges is around patient engagement, where point solution vendors seek to address the many tasks that fall under its large umbrella; such as access, communication, and readiness. In this timely webinar, we’ll speak to leaders who have thought through their patient engagement journey so — as they move from here to there — they don’t pick up an excessive number of isolated vendor/partners along the way.
Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise
They represent the crown jewels for cybercriminals — legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible — such as extensive training and phishing tests — to guard against compromise, it’s not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it’s possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that’s no longer the case. In this timely webinar, we’ll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.
HIMSS24 Conference Wrap: Keith Duemling Says Recent Events Prove Cyber Warrants Main Stage Billing
There’s an old parenting saying, “Do as I say, not as I do.” Of course, it’s meant to get parents off the hook for not demonstrating the behavior they want emulated. Unfortunately, it rarely works, as the disconnect between talk and action isn’t lost on the little ones. When it comes to recent conferences, some […]
HIMSS24 Conference Wrap: Mike Mistretta Says, as Conferences Evolve, CIOs Must Adjust Accordingly
Then only thing that’s constant is change, which means the key is being observant. At least that seems to be the key when navigating the industry’s changing mega-conference dynamic. In the spring, there used to be just HIMSS, with the CHIME Spring Forum affixed to the front-end. Now, CHIME partners with HLTH on ViVE. With […]
Partner Perspective: Application Rationalization Combined with a Move Towards Zero Trust Will Improve Chances of Network Stability
Strategies for Reducing IT Costs Without Compromising Service
Like any cost center, IT departments are continually asked to spend less, without reducing either the quantity or quality of services they provide. If it sounds like a tall order, it is. That’s why many health systems, though they’ve tried mightily over the past few years, have seen limited success in doing more with less. But, believe it or not, there are ways to drive down spend that can leave an organization well positioned for the future, perhaps even more so than if they didn’t cut at all. In this timely webinar, we’ll speak to leaders who have made strides with — and have a fresh perspective on — cost-cutting to learn how they look at the problem, where they go first, and how to ensure any proposed changes are both actionable and sustainable.
Q&A with Englewood Health CIO Inderpal Kohli: “Only 20 Percent of It Is About Tools.”
With resources becoming increasingly scarce, it’s more important than ever to prioritize value, said Inderpal Kohli, CIO at Englewood Health. During a recent interview, he talked about what it means to be “a use case and outcomes-driven organization,” how he works to connect his team with the mission of the organization, and the real challenge with digital transformation.