07:46 pm May 15, 2017
Tressa Springmann CIO at Baltimore-based LifeBridge Health, and Mary Jo Morrison, principal with The Chartis Group, say smart analytics projects demand leadership, accountability, incentive alignment and a data-driven culture of decision-making.
05:26 pm May 15, 2017
Leonard, D’Avolio, Harvard professor and CEO of Cyft, sees a near future where artificial intelligence and machine learning will enable transformative improvements in healthcare. But it's important to have realistic understandings of their capabilities.
04:54 pm May 15, 2017
(SPONSORED) Vik Nagjee, VP and CTO for global healthcare solutions at Pure Storage, offers his perspective on the technology and processes necessary to make data work for you.
11:18 pm May 14, 2017
Jamie Lam, data security compliance manager for the University of California at San Francisco School of Medicine offers tips for managing "shadow IT" as tech-savvy employees find their own ways to work effectively.
11:13 pm May 14, 2017
Matt Trevors, a senior member of the technical staff with the CERT Division of the Software Engineering Institute at Carnegie Mellon University, offers help for meeting the HIPAA Security Rule.
11:05 pm May 14, 2017
Kevin Fu, associate professor of computer science and engineering at the University of Michigan, sees historic parallels with our current cybersecurity moment.
10:59 pm May 14, 2017
Sharon Klein, partner in the Health Sciences Department of Pepper Hamilton, offers tips for audit preparedness, business associate agreements, cyber insurance and more.
10:50 pm May 14, 2017
Kim Jones, director of the Cybersecurity Education Consortium at Arizona State University discusses the keys to "transformational security."
03:51 pm May 12, 2017
M.K. Palmore, FBI assistant special agent in charge of San Francisco's Cyber Branch, also describes a fast-evolving threat landscape, explains cyber criminals' focus on ROI and discusses the emerging security trends that concern him the most.
02:46 pm May 12, 2017
(SPONSORED) Adam Brand, director of privacy and security at Protiviti, describes his work exploring medical device weaknesses, and points to two main areas of risk.