New regulations, including those coming into effect in the U.S., are pushing many medical device makers to radically reconsider how they approach cybersecurity for their products - including air gapping connections, said Phil Englert of the Health Information Sharing and Analysis Center.
It is increasingly important for healthcare entities to carefully examine their cyber and other insurance policies to see what risks are covered in the event of a cyber incident, especially as the threat landscape continues to evolve, said attorney Peter Halprin, a partner at law firm Pasich LLP.
In an ESG research it was found that employees were spending an average of six hours per week doing work-related tasks outside of office hours. This shows that even before the pandemic hit, the lines between office and home life had begun to blur.
As this lead to a disturbance in the enterprise architecture,...
No secret: Public cloud provides the technical catalyst to the healthcare industry’s modernization and the keys to the kingdom in terms of globalization. The resulting access to usable swaths of data is invaluable - and high-risk. ClearDATA's Chris Bowen weighs in on mitigating the risks.
In this session, HHS OCR provides an update on its latest HIPAA compliance and regulatory efforts - including possible modifications to the HIPAA rules. Then a panel of experts discusses:
Latest health data breach trends, including soaring hacker incidents;
The evolving regulatory climate and its impact on health...
In the digitally-transformed healthcare landscape, PHI is transmitted and stored in the cloud and accessed by legions of privileged users; patients now have unprecedented access to their own data and records, which are coveted by fraudsters on the Dark Web; and regulators are increasingly scrutinizing the privacy and...
What approaches are healthcare entities taking with their credentialing and IAM to better verify and manage the identities of patients, clinicians, researchers, vendors and others who want or need access to health and other critical data? Our panelists Cris Ewell, CISO at UW Medicine and Jigar Kadakia, CISO and chief...
Suzanne Schwartz, MD, Associate Director for Science and Strategic Partnerships, at the Food and Drug Administration's Center for Devices and Radiological Health, will provide an update on FDA's medical device cyber efforts. That includes the status of a draft update to the cybersecurity guidance for premarket...
The federal government says it will scrutinize healthcare providers and health IT vendors that participate in so-called "information blocking." But what are the top technical challenges and other barriers in ensuring that health information is being appropriately, legally and securely shared with clinicians, patients...
What are the new data security, patient safety and privacy worries evolving with each new cyberattack on the healthcare sector? Our panel of experts - Jigar Kadakia, CISO of Partners HealthCare; Michael McNeil, global security officer at Philips; and Chris Frenz, CISO Interfaith Medical Center - will discuss what...
Insider threat and email attack risks are a major issue in the health industry, 95% of IT executives have identified insider threats as a top concern in last 12 months, 79% think employees have put data at risk accidentally and 61% say employees have done so maliciously.
In this session will look at how...
Many healthcare organizations today are hiring managed security service providers (MSSP) to manage specific security initiatives, or in some cases, outsourcing their entire security program. This approach is especially beneficial to those that have limited IT resources, lack internal security expertise, struggle to...
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization...
Health organizations face a wide range of new cyber security threats like crypto-jacking and IoT vulnerabilities while still facing the heavy load of compliance and basic security blocking and tackling. Security requires an end to end framework based approach to manage well against a constantly evolving threat...
The U.S. Department of Justice just indicted two alleged hackers in China in the highly sophisticated cyberattack on health insurer Anthem that exposed data on nearly 80 million Americans. Meanwhile, ransomware, business email compromises, intellectual property theft and other headline-grabbing breaches and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.