In 10 years as a security compliance officer, Christopher Paidhrin has seen his role broaden as data security has become an even higher priority at Southwest Washington Medical Center in Vancouver, Wash.
Today, Paidhrin is more involved in policy development. He's also pushing to improve awareness of the policies...
Hospitals and other healthcare organizations need to identify data security breaches "in a much more systematic way" to help ensure the privacy of personal information. That's the advice of Lisa Gallagher, senior director for privacy and security at the Healthcare Information and Management Systems...
The single most important step hospitals should take to comply with the HITECH Act is to retrain all employees, physicians and even volunteers on how to maintain the privacy and security of personal health information. That's the advice of Dan Rode, a regulatory expert at the American Health Information Management...
Completing security risk assessments for a long list of applications and providing data security training to its entire staff are two of the top priorities for 2010 at Johns Hopkins Medicine, one of the nation's largest academic medical centers.
In an interview, Stephanie Reel, vice president for information...
How do security leaders at community hospitals address data security challenges such as compliance with the HITECH Act?
Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up many data security tasks among the members of his team, each...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Interview with Jody Westby, Adjunct Distinguished Fellow at CyLab and CEO at Global Cyber Risk
At a time when risks are high and consumer confidence is low, corporate boards of directors aren't paying nearly enough attention to information security and cyber threats.
This is the key takeaway from a new Carnegie...
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal Auditors (IIA), discusses:
The key differences between internal and IT...
Interview with David Richards, President of the Institute of Internal Auditors
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist and former CISO at Bear Stearns & Co., discusses:
What governance...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.