HealthIMPACT Live Presents: IoT, Ransomware, Human Factors of Cybersecurity, Data Protection and Tokenization - Understanding the Perfect Storm of Vulnerabilities to Manage Cyberthreats
Originally Published: Apr 7, 2022
YouTube Video: https://youtu.be/d-put3vQp7w
No matter how robust your organization's security stack is, vulnerabilities to intrusions still exist. Unmanaged cyberthreats can compromise your organization’s ability to perform its mission by putting critical assets, data, and services at risk. As more and more organizations move toward the cloud, keeping track of where sensitive data resides becomes increasingly difficult putting increasing pressure on data security teams. Recent events in healthcare IT show that a zero-trust security strategy is the only way to prevent successful security breaches and ensure no threat or vulnerability to the continuity of care model. In this session, health system security leaders discuss how to:
Manage critical privacy and security issues healthcare organizations face
Establish and optimize information security and privacy operations to be better prepared to address current — and future — IT risks
Transitioning and securing data methods and devices – IoMT, IoT
Data protection and tokenization
Getting clear, readable data out of the healthcare environment
Mauricio Angee, AVP, Chief Information Security Officer, University of Miami Health System
Melissa Lawlor, CISSP, Director, IT Security GRC, Hackensack Meridian Health
Michael Ebert, Partner, Guidehouse