To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep...
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
In...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the IAPP;...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Interview with Cliff Baker of HITRUST Alliance
For too many healthcare organizations, information security is about regulatory compliance - requirements and checklists.
It's time for patients, privacy and true information security to be prioritized, says Cliff Baker, Chief Strategy Officer with the HITRUST...
Social networking. Cyberbullying. Identity theft.
There are myriad threats to children as they explore their online universe. And to counter these threats is Safe and Secure Online, a new interactive presentation that brings information security professionals into classrooms to give sound advice to 11-14-year-old...
Many people are now considering healthcare for the first time. Dr. Robert Mandel has dedicated his entire career to the field.
Now senior VP of health care services for BlueCross BlueShield of Tennessee, Mandel takes time to discuss:
His organization's healthcare and privacy concerns;
Healthcare trends he's...
Healthcare and privacy - they have emerged as two huge topics in 2009, and Nick Mankovich of Philips Healthcare blends both of them into his career.
Director of Product Security & Privacy, Mankovich discusses:
His customers' main privacy and medical device security concerns - and how they are being...
Legal Insights on Data Privacy Trends and Breach Response
Your organization has been breached - how should you immediately respond? How should you not respond?
Alysa Hutnik, attorney with Kelley Drye in Washington, D.C., specializes in information security and privacy, counseling clients on what to do after a...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
In an exclusive interview, Bryan Sartin of Verizon Business, discusses the company's exhaustive research of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.