Data Protection – Planning for Today’s Challenges
By Derek Sliger, Sr. Director Information Security, Children’s Health Data Protection at its core is the processes and practices that
Read MoreData Security
By Derek Sliger, Sr. Director Information Security, Children’s Health Data Protection at its core is the processes and practices that
Read MoreBy Mitch Parker, CISO, Indiana University Health The CURES Act Final Rule’s provision requiring healthcare providers to give access to
Read MoreBy Heidi Baskfield, VP Population Health & Advocacy, Ellen Sublett, Quality Improvement Specialist, Sana Yousuf, Software Engineer, Children’s Hospital Colorado
Read MoreBy Devin Shirley, CISSP, C|CISO, CRISC, Arkansas Blue Cross Blue Shield Information security is something I’ve been involved within various
Read MoreBy Cris Ewell, PhD, CISO, UW Medicine Healthcare continues to be targeted by cybercriminals, and we have seen an increase
Read MoreUtilizing a cyber security Framework will establish the completeness of a cyber security program and establish a consistent model for managing and communicating the program. Success is demonstrated by effectively managing risk and communicating progress by category based on the agreed upon framework.
Read MoreBy Joseph Cacchione, MD, FACC, Executive Vice President, Clinical & Network Services, Ascension There is no question that healthcare has
Read MoreBy Beverly Jordan, Vice President and Chief Information and Transformation Officer, Baptist Memorial Health Care While electronic health records are mandated
Read MoreBy Venkat Bhamidipati, EVP & CFO, Providence St. Joseph Health When I joined Providence St. Joseph Health, one of the
Read MoreBy Mark Crandall, Chief Information Officer, Consulate Health Care At the nexus of Healthcare and Technology emerges solutions aimed to
Read More