Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.
June 01, 2020Analysis: Verizon's Latest Data Breach Investigation ReportVerizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as issues linked to cloud implementations and web applications. In an interview, Verizon's Ashish Thapar offers an in-depth analysis....more0minPlay
May 29, 2020Identity Verification in Healthcare: Revamping a FrameworkA 15-year-old identity framework originally designed for narrow use by pharmaceutical companies is being revamped and updated for broader use in healthcare, says Kyle Neuman, managing director of SAFE Identity, an industry consortium and certification body that's coordinating the project....more0minPlay
May 29, 2020Analysis: Surge in Attacks Against BanksThe latest edition of the ISMG Security Report analyzes why cyberattacks against banks have surged in recent weeks. Plus: The increasingly ruthless tactics of ransomware gangs; cybersecurity strategies for small businesses....more0minPlay
May 28, 2020Safeguarding COVID-19 Research, Other Intellectual PropertyAs cyberthreats to medical research on COVID-19 - and other intellectual property - grow, organzations must take critical steps to prevent the theft of their "innovation capital," says Russell Koste, chief security officer of Alexion Pharmaceuticals....more0minPlay
May 26, 2020AMA Outlines Privacy Principles for Health DataThe American Medical Association has issued a set of privacy principles for health data that it hopes Congress and regulators will keep in mind as they prepare legislation and regulations. In an interview, AMA Board Chair Jesse Ehrenfeld, M.D., describes the recommendations....more0minPlay
May 26, 2020How to Avoid Unnecessary Breach ReportingHealthcare organizations need to diligently assess whether a security incident involving patient information truly qualifies as a reportable breach under HIPAA to avoid needlessly reporting it to federal regulators, says regulatory attorney Helen Oscislawski....more0minPlay
May 22, 2020Analysis: The Long-Term Implications of 'Work From Home'The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development....more0minPlay
May 21, 2020Remote Workforce Security: The Role of 'Zero Trust'Kevin Schwarz of Zscaler discusses the security implications of the "new normal" of employees working from home, including the role of a "zero trust" strategy....more0minPlay
May 21, 2020Remote Workforce Security - the Long Game"Risk acceptance" was the operative term as organizations quickly deployed remote workforces in response to the global crisis. But now, as this deployment becomes a long-term option, enterprises need to take a future-focused view toward identity, cloud, and the attack surface. Forcepoint's Homayun Yaqub offers tips....more0minPlay
May 18, 2020Why Cyberthreats Tied to COVID-19 Could Hit Diverse TargetsBesides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa....more0minPlay
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.