HIMSS Radio at HIMSS17 featured several of our popular guests back to the show. Enjoy these short video highlights from interviews and panel sessions and be sure to watch for more or listen in on the HIMSS Radio page.

Stephen Lieber interviews John Boehner and Ed Rendell at HIMSS17 as they remark on the political evolution of Obamacare. Boehner offers his perspective on the uncertain future of the law's provisions under the new Trump administration. Read the story from the keynote presentation.

Catch a glimpse of the week that was HIMSS17: more than 300 education programs featuring keynotes, thought leader sessions, roundtable discussions and workshops, plus a full day of preconference symposia and the most exciting exhibition floor yet.

Four security experts discuss how recent cybercriminal activities shed light on the increasing need for better security, due to the severity of attacks and the need to protect valuable patient data.

Develop a disaster recovery plan that enables clinicians to provide patient care without disruption. Providing advanced recovery services, co-location and managed recovery-as-a-service are critical to supporting clinicians’ access to patient information 24/7.


Learn more about cloud solutions for disaster recovery in healthcare IT

Many security breaches begin with en email that allows malware enters the organization  healthcare institutions begin as a result of phishing. To combat this thread, Mayo Clinic initiated an institution wide No Phishing Campaign based on education and simulated phishing exercises for all employees.

(SPONSORED) John Summers, Vice President and General Manager of Enterprise at Akamai offers several suggestions relative to access control, provisioning user accounts, and engaging in agile digital transformation that also enables hospital IT departments to better serve customers. Summers also shares his vision of what healthcare organizations should be thinking about today to be secure three to five years into the future.

Penetration or pen tests are an increasingly popular way to find the access points on a network that can be exploited by hackers. In his presentation at the Healthcare Privacy and Security Forum, Chris Crowley explains the value and the limits of these tests, and how to ensure that you can get the most benefit from a pen test.

A successful cyber-security program requires a comprehensive approach. Shenny Sheth talks about the management philosophy that Texas Children’s Hospital has taken to creating its blueprint for the successful implementation of a security program.

(SPONSORED) As the number of devices connected to a healthcare network continues to expand, so do the points of vulnerability. Many of these devices add new access points for malware that can threaten the overall security of the network. Isolation can be part of the solution.