Data Protection – Planning for Today’s Challenges
By Derek Sliger, Sr. Director Information Security, Children’s Health Data Protection at its core is the processes and practices that
Read MoreBy Derek Sliger, Sr. Director Information Security, Children’s Health Data Protection at its core is the processes and practices that
Read MoreBy Mitch Parker, CISO, Indiana University Health The CURES Act Final Rule’s provision requiring healthcare providers to give access to
Read MoreBy Heidi Baskfield, VP Population Health & Advocacy, Ellen Sublett, Quality Improvement Specialist, Sana Yousuf, Software Engineer, Children’s Hospital Colorado
Read MoreBy Devin Shirley, CISSP, C|CISO, CRISC, Arkansas Blue Cross Blue Shield Information security is something I’ve been involved within various
Read MoreBy Connie Barrera, CISO, Jackson Health System When you peel away the layers and minimize the noise, the ultimate goal
Read MoreBy Cris Ewell, PhD, CISO, UW Medicine Healthcare continues to be targeted by cybercriminals, and we have seen an increase
Read MoreBy Tim Swope, CISO, Catholic Health Services of Long Island In order to deliver value to our customers, patients, employees,
Read MoreUtilizing a cyber security Framework will establish the completeness of a cyber security program and establish a consistent model for managing and communicating the program. Success is demonstrated by effectively managing risk and communicating progress by category based on the agreed upon framework.
Read MoreBy Joseph Cacchione, MD, FACC, Executive Vice President, Clinical & Network Services, Ascension There is no question that healthcare has
Read MoreBy Beverly Jordan, Vice President and Chief Information and Transformation Officer, Baptist Memorial Health Care While electronic health records are mandated
Read More