Skip to main content

Privacy & Security Forum Boston 2016

By Bill Siwicki | 09:54 am | November 21, 2016
Scott Borg of the U.S. Cyber Consequences Unit said that health executives must take into account the economics of security and that is more about making decisions that create value than just money.
By Bill Siwicki | 01:10 pm | November 15, 2016
Reliance on user IDs and passwords has put many organizations in a bad place. But more complex, secure and usable solutions exist to ensure individuals accessing a system are indeed who they say they are, says cybersecurity expert Mansur Hasib.
By Bill Siwicki | 09:43 am | November 07, 2016
Joel Brenner, former senior counsel at the National Security Agency, discusses the history of cybersecurity, the problems in healthcare, and where organizations can look for help.
By Jessica Davis | 08:30 am | November 04, 2016
A surprising number of IT leaders are confident in their security posture, new research found, and that includes how they stack up against peers. That might be cause for concern.
By Bill Siwicki | 10:55 am | October 31, 2016
Approach cybersecurity like war. Then take a defender’s standpoint, share information whenever possible, understand what you really need to accomplish and study history.
By Bill Siwicki | 07:36 am | October 20, 2016
Healthcare organizations must be proactive about protecting patient data. But that doesn’t mean it’s safe to skip the reactive reporting and linear approach, the COO of a health information exchange explains.
By Jessica Davis | 07:50 am | October 18, 2016
Managing user privileges is among the most basic practices in any security strategy. Establishing a process also paves the way for other tactics, like provisioning and bridging the gap between IT and HR, that can keep internal and external threats at bay. Experts divulge insights and best practices. 
By Bill Siwicki | 07:59 am | October 13, 2016
IT Process Institute CEO Scott Alldridge said healthcare organizations need to support security spending and technologies with IT and process rigor to avoid breaches.
By Mike Miliard | 08:21 am | October 12, 2016
Hospitals and provider organizations now have to manage business associates that might share data or access to it with overseas vendors. Experts say OCR won't pursue foreign companies after a breach. That means all risk remains on HIPAA-covered entities.
By Tom Sullivan | 08:15 am | October 10, 2016
Don’t wait another day to create a cyberthreat intelligence sharing team. Delve into the web’s dangerous corners, exchange what you find, learn from banking and defense. Just don’t presume cyberthreats won’t happen to you.