Privacy & Security
01:50 pm June 01, 2017
Adnan Hamid, Assistant CIO at Henry Mayo Newhall Hospital, discusses the organization's areas of focus for health IT in 2017 including cybersecurity, disaster recovery, interoperability and more.
11:18 pm May 14, 2017
Jamie Lam, data security compliance manager for the University of California at San Francisco School of Medicine offers tips for managing "shadow IT" as tech-savvy employees find their own ways to work effectively.
11:13 pm May 14, 2017
Matt Trevors, a senior member of the technical staff with the CERT Division of the Software Engineering Institute at Carnegie Mellon University, offers help for meeting the HIPAA Security Rule.
11:05 pm May 14, 2017
Kevin Fu, associate professor of computer science and engineering at the University of Michigan, sees historic parallels with our current cybersecurity moment.
10:59 pm May 14, 2017
Sharon Klein, partner in the Health Sciences Department of Pepper Hamilton, offers tips for audit preparedness, business associate agreements, cyber insurance and more.
10:50 pm May 14, 2017
Kim Jones, director of the Cybersecurity Education Consortium at Arizona State University discusses the keys to "transformational security."
03:51 pm May 12, 2017
M.K. Palmore, FBI assistant special agent in charge of San Francisco's Cyber Branch, also describes a fast-evolving threat landscape, explains cyber criminals' focus on ROI and discusses the emerging security trends that concern him the most.
02:46 pm May 12, 2017
(SPONSORED) Adam Brand, director of privacy and security at Protiviti, describes his work exploring medical device weaknesses, and points to two main areas of risk.
02:23 pm May 12, 2017
Data security professionals may not always be the most natural communicators, but they should learn to be if they want to achieve their mission, says Terry Ziemniak, chief information security officer at Carolinas HealthCare System.
11:24 pm May 11, 2017
Bruce James, director of cybersecurity architecture at Intermountain Healthcare, discusses its approach to identity and access management, explains its recent focus on patient-centered IAM systems and offers some best practices for other healthcare providers to follow.