healthsystemcio.com

healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  • Subscribe
  • Advertise
  • About
    • Our Team
    • Register/Login
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advisory Panel
  • Webinars
    • 3/16-Securing Medical Devices
    • 3/18-Business Associate Impostor Emails 
    • 3/25-Integrating Disparate Data Sources
    • 4/1-Battling Clinician Burnout
    • On-Demand Webinar Library

  • Subscribe
  • Advertise
  • About
    • Our Team
    • Register/Login
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advisory Panel
  • Webinars
    • 3/16-Securing Medical Devices
    • 3/18-Business Associate Impostor Emails 
    • 3/25-Integrating Disparate Data Sources
    • 4/1-Battling Clinician Burnout
    • On-Demand Webinar Library
Health system employees often deal with dozens of suppliers to get their jobs done. Supply chain staff — because of their engagement with business associates — regularly download files, click links or use third-party applications. Unfortunately, email fraud often starts with the attacker posing as a trusted individual with a legitimate business request, leaving these end users particularly vulnerable and healthcare organizations exposed to theft and emerging cyber risks.

Devising Defenses to One of Your Top Security Threats: Business Associate Impostor Emails

New Webinar Coming 3/18 at 12 ET

registerx

Health system employees often deal with dozens of suppliers to get their jobs done. Supply chain staff — because of their engagement with business associates — regularly download files, click links or use third-party applications. Unfortunately, email fraud often starts with the attacker posing as a trusted individual with a legitimate business request, leaving these end users particularly vulnerable and healthcare organizations exposed to theft and emerging cyber risks. In this webinar, we’ll hear from an esteemed group of healthcare leaders who are leveraging a combination of technology, threat intelligence and education to keep their employees from being tricked, and their systems from being breached. We’ll address various topics including:

  • Types of impostor email threats in healthcare
  • Security controls you expect from your expansive supplier network
  • What controls to put in place to ensure your supply chain vulnerability is most protected
Can’t make the live broadcast? Register anyway to be notified when the On-Demand video and Podcast recordings are ready.
x

Sponsored By

Continuing Education Credits: Attendees who hold the CHIME CHCIO certification earn 1 CEU. Attendees who hold the AEHIS CHISL certification earn 1 CEU for attending security-focused Webinars. Other programs — such as those offered by AHIMA and NAHQ/HQCC — may also award CEUs. Check with your provider.
a
On-Demand Webinar Library
Subscribe to Learn of Future Events
Advertising & Marketing Services
Share

Content by Topic

Copyright © 2021 HealthsystemCIO.com.