Training

Governance & Risk Management , Healthcare , Industry Specific

PHI: How Many Devices Does It (Securely) Reside On

PHI: How Many Devices Does It (Securely) Reside On

It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session, two security experts will offer insights on identifying, documenting and protecting the flow of sensitive data, such as PHI, through an organization. Attendees will learn how this effort ties back to an organizational risk assessment and reinforces the importance of properly protecting data, both in transit and at rest.

See Also: Managing Shadow IT Across Your Enterprise

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.