Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Business Continuity: Breaking the Silos
20/05/2011One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.
-
U.S. Initiates Cybersecurity Diplomacy
20/05/2011Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
-
How to Refine Privacy, Security Training
18/05/2011Alexander Eremia, chief privacy officer at MedStar Health, says role-based staff training on privacy and security issues is essential.
-
New Threats, New Data Security Strategies
18/05/2011The threat landscape has evolved dramatically over the past several years, and now it's time for healthcare security leaders to step up and meet the new challenges involved with securing critical data.
-
Breach Notification: Be Prepared
16/05/2011Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.
-
Health Information Exchange Success Strategies
16/05/2011Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.
-
Congressman Sees Obama Plan as a Start
13/05/2011Rep. James Langevin sees some shortcomings in the president's cybersecurity initiatives unveiled Thursday.
-
Disaster Recovery: Cross-Training Key
11/05/2011A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
-
Cloud Computing for Image Transfers
10/05/2011Cloud computing helps ease the exchange of diagnostic images while maintaining adequate security, says Amy Radonich of University of California San Diego Health System.
-
Social Media: Minimizing Risks
09/05/2011All employers need to overcome the common misperception that "you can say anything you want on social media and not have any consequences," says compliance specialist Roy Snell.
-
Public Jitters Over IT Security on Rise
06/05/2011The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.
-
Limited Government: Path to NSTIC
04/05/2011Big brother isn't the relation the government sees itself portraying in developing the National Strategy for Trusted Identities in Cyberspace. Uncle Sam has a more avuncular role in mind, giving advice and serving as a role model.
-
The Case for Cloud Security Standards
03/05/2011"On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.
-
Why CISOs Must Care About Sony Breach
02/05/2011Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.
-
Personalized Medicine and Privacy
02/05/2011A CIO involved in an ambitious personalized medicine project that uses genetic information describes how privacy issues are addressed.
-
HealthcareInfoSecurity Editor's Choice for April 2011
29/04/2011Editor's Choice: Mostashari Addresses Privacy, Security; 10.8 Million Affected by Major Breaches; Time for a Social Media Policy is Now
-
Breach Notification Planning Tips
29/04/2011"Breach notification planning is just a fundamental, basic part of risk management in the new millennium," says security expert Bob Chaput.
-
Mostashari Addresses Privacy, Security
28/04/2011"We need to ensure and maintain the public's trust in health information systems and the exchange of their health information," says Farzad Mostashari, the new national coordinator for health information technology.
-
Security Testing Comes of Age
27/04/2011Four years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.
-
Physical Security: Timely Tips
25/04/2011Security expert Andrew Weidenhamer offers insights on physical security measures that can help prevent breaches.