BluePrint's Vice President and Chief Information Security Officer, Mark Ferrari, and Beebe Healthcare's CIO, Michael Maksymow, will present as part of a panel titled, "Managing Medical Device Risk with the HITRUST CSF."
Hollywood builds a picture of what a typical hacker looks like – sitting in a dark basement surrounded by computers. The modern hacker is savvier and takes a different approach. They’re out in public and probably dressed similarly to you.
Today, we explore these threats and share three examples of techniques that are on the rise, as well as ways that you can stop human-manipulation attacks.
My colleague, Edward Henry from Princeton Healthcare System, and I had a great time talking with the audience at NJ/DVHIMSS last month. Our topic seemed to have struck a chord and the questions and reactions after the session have reinforced the need for business impact analysis in our healthcare organizations.
Today, covered entities and business associates are addressing a wide-range of regulatory requirements necessary to solve the growing complexities in the healthcare industry. Evolving technologies, migration to the Cloud and cyber threats like ransomware are just a few top-of-the-mind issues. Combine those with regulations under HIPAA, Meaningful Use, PCI, COBIT and ISO, and you will find that covered entities and business associates need a way to more effectively manage their security programs.