Privacy & Security Forum Boston 2016
Scott Borg of the U.S. Cyber Consequences Unit said that health executives must take into account the economics of security and that is more about making decisions that create value than just money.
Reliance on user IDs and passwords has put many organizations in a bad place. But more complex, secure and usable solutions exist to ensure individuals accessing a system are indeed who they say they are, says cybersecurity expert Mansur Hasib.
Joel Brenner, former senior counsel at the National Security Agency, discusses the history of cybersecurity, the problems in healthcare, and where organizations can look for help.
A surprising number of IT leaders are confident in their security posture, new research found, and that includes how they stack up against peers. That might be cause for concern.
Approach cybersecurity like war. Then take a defender’s standpoint, share information whenever possible, understand what you really need to accomplish and study history.
Healthcare organizations must be proactive about protecting patient data. But that doesn’t mean it’s safe to skip the reactive reporting and linear approach, the COO of a health information exchange explains.
Managing user privileges is among the most basic practices in any security strategy. Establishing a process also paves the way for other tactics, like provisioning and bridging the gap between IT and HR, that can keep internal and external threats at bay. Experts divulge insights and best practices.
IT Process Institute CEO Scott Alldridge said healthcare organizations need to support security spending and technologies with IT and process rigor to avoid breaches.
Hospitals and provider organizations now have to manage business associates that might share data or access to it with overseas vendors. Experts say OCR won't pursue foreign companies after a breach. That means all risk remains on HIPAA-covered entities.
Don’t wait another day to create a cyberthreat intelligence sharing team. Delve into the web’s dangerous corners, exchange what you find, learn from banking and defense. Just don’t presume cyberthreats won’t happen to you.