With the widespread rollout of remote patient monitoring and telehealth solutions in reaction to the current pandemic, the healthcare industry is encountering new threats to health data security and privacy on top of the daily risks they were facing prior to COVID-19.
This Summit will focus on strategies and technologies healthcare organizations can implement to safeguard critical systems and sensitive data against new and emerging threats, as well as the implications of policy and regulation changes on health data security and privacy.
We invite everyone to attend free of charge. Listen live, ask questions and collaborate in our virtual environment.
Can't make the Summit? Register and a link to the recording will be sent to you.
There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.
Join us for this session where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will dive into:
Roger Grimes
Data-Driven Defense Evangelist
KnowBe4
Gary will discuss the ever-evolving threat landscape, fueled by the rapidly expanding digital healthcare landscape. He'll touch on the compliance issues providers must consider when implementing security changes, as well as best practice security considerations.
Gary Gooden
Chief Information Security Officer
Seattle Children's
In this session, Chris Bowen draws upon his deep understanding of HIPAA and digital technologies to look at the challenges in virtual care when using Remote IoT that must become and remain HIPAA compliant. While many look at the front side of the apps and UX/user experience, Bowen will dive into what must happen on the backside to ensure privacy, security, and compliance. He will speak to recent rulings, data flow vulnerabilities, reference architectures, and what must be considered to protect data shared to and from Remote IoT in a cloud-based eco-system where a growing number of “HIPAA eligible” services do not guarantee HIPAA compliance.
Chris Bowen, CISSP, CCSP, CIPP-US, CIPT
Founder, Chief Privacy & Security Officer
ClearDATA
In honor of Cybersecurity Month, we invite you to join us for a fireside Chat with Skip Rollins, CIO, Freeman Health.
Medical device and connected device innovation has led to incredible advances in patient care. As the number of these devices explode, the surface area for potential cyberattacks also increases. What are the best practices to secure these devices? Who are the key organizational stakeholders and what are the critical use cases to address? What are the considerations for selecting the right vendor or solution?
In this session, hear from Skip Rollins, CIO of Freeman Health, as he discusses the challenges and best practices of securing IoMT devices.
Skip Rollins
CIO
Freeman Health System
Russell Rice
Vice President of Products
Ordr
Covid-19 has emphasized the need for secure and efficient practices. We’ve learned the importance of quickly provisioning temporary clinical staff to meet demand; we’ve risen to the challenges of virtual care, including remotely authenticating clinicians to access patient records, and more.
At the core of these adaptive solutions is the Digital Identity – now more important than ever. Join us to gain insights on building your Digital Identity Framework to face challenges in 2021 and beyond.
Kristina Cairns
Director of Product Marketing
Imprivata
Christopher McKay, RN
Director of Nursing & Clinical Workflow Specialist
Imprivata
The massive amount of patient data available in today’s healthcare environment, when leveraged appropriately, is driving strategies around patient experience and improved outcomes. When developing a data strategy, healthcare organizations must consider CMS Interoperability & HIPAA compliance standards.
In this session, Red Hat and TEKsystems Global Services will review customer best practices for securing servers, platforms, and data while automating all aspects of security. This session will cover the Red Hat compliance and automation offering and discuss how to build expert-based systems in the area of compliance as code while democratizing the information.
Learning Points:
Alan Scott
Chief Architect
Red Hat
Kory Patrick
Risk & Security Solution Executive
TEKsystems Global Services
Randy Fusco
CTO, Healthcare
TEKsystems Global Services