Electronic Healthcare Records , Governance & Risk Management , Healthcare

Partnership Insecurity: Practice the Art of Diligence

Clearwater's Jon Moore on When, How to Add Security to Partnership Discussion
Jon Moore, chief risk officer and senior vice president of consulting services and customer success, Clearwater

Healthcare cybersecurity leaders often say they do a great job of onboarding new partners, but then they add that ongoing monitoring of the relationship falls short. Jon Moore of Clearwater talks about when and where to talk security with partners - and red flags to watch out for.

See Also: User Entity & Behavior Analytics 101: Strategies to Detect Unusual Security Behaviors

In this video interview with Information Security Media Group, Moore discusses:

  • Healthcare's new awakening to due diligence;
  • Risks inherent in modern partnerships;
  • Red flags to watch out for, so security issues don't derail a deal.

Moore has a background in privacy and security law, technology and healthcare. He works with healthcare leaders to safeguard patients' health and health information, as well as corporate capital, earnings and reputation, through the creation and development of strong, proactive cybersecurity and compliance programs. Together with his colleagues at Clearwater, he provides the strategic advice, services, training and tools needed to move organizations across the healthcare ecosystem to a more secure, compliant and resilient state so they can achieve their missions.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.