Governance & Risk Management , Incident & Breach Response , Security Operations

PHI Is More Valuable than Credit Cards: Time to get serious about data security

PHI Is More Valuable than Credit Cards: Time to get serious about data security

From Anthem to Community Health Systems, healthcare data breaches are on the rise, and it's time to get serious about healthcare data security. In this webcast, we discuss practical steps you can take to improve your IT security - not only to comply with HIPAA / HITECH compliance, but to actually prevent data breaches.

View this webinar and learn the:

  • 3 areas of focus for the upcoming OCR audits;
  • Keys to the Targeted threat framework and threat environment;
  • Steps to improve IT security and disrupt the threat framework.


Threat actors are increasingly targeting PHI (Protected Health Information). Standard targets of identity theft, such as credit card numbers with related CDI and PIN information, are going for about one dollar per record on the black market. But a complete identity-theft kit containing comprehensive PHI credentials (including all personal data and related medical information) is worth up to $1,000 per record.

Over the last two years 94% of hospitals had at least one data breach and 92% of breaches were by organized criminal groups for financial gain. Beyond this year's large healthcare data breach affecting 4.5M records, the growing list of data security failures on the "wall of shame" includes over 1,200 reportable breaches, plus an additional 120,000 smaller breaches that each impact fewer than 500 individuals.

All of this means big paydays for hackers and even bigger headaches for Healthcare sector IT professionals. Beyond any organizational monetary cost associated with data breaches, inadequate data security invites additional scrutiny from the OCR including possible intrusive oversight, significant fines, or even criminal penalties.

This webinar will:

  • Identify the 3 attack vectors and their impacts;
  • Outline the keys for building a successful IT risk mitigation strategy;
  • Explore the defense-in-depth concept and practical tools for its implementation.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.