Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.
November 13, 2019Google's Push Into Health Sector: Emerging Privacy IssuesWith Google aggressively expanding its push into the healthcare sector, critical privacy-related issues are emerging, says regulatory attorney Alisa Chestler, who offers an overview of key issues....more0minPlay
November 12, 2019What Mega Breaches Can Teach about Best PracticesGetting breached is not a question of "if," but "when." Nick Carstensen of Graylog explains what steps should be taken to mitigate data breach risk....more0minPlay
November 12, 2019CCPA Compliance: Identity Verification ChallengesOne key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues....more0minPlay
November 11, 2019Identity Fraud: Account OriginationBala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses?...more0minPlay
November 08, 2019Protecting Data in Sprawling Computing EnvironmentsSprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA....more0minPlay
November 08, 2019Analysis: Using Twitter for EspionageThe latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks....more0minPlay
November 07, 2019Why Is Third-Party Risk Management So Complex?Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner....more0minPlay
November 06, 2019Getting Ready for the NIST Privacy FrameworkBy year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights....more0minPlay
November 05, 2019Inside the Sophos 2020 Threat ReportThe Sophos 2020 Threat Report is out, and among the key findings: Ransomware attackers continue to leverage automated active attacks that can evade security controls and disable backups to do maximum damage in minimal time. John Shier of Sophos analyzes the trends that are most likely to shape the 2020 cybersecurity landscape....more0minPlay
November 01, 2019Why the Healthcare Sector Is So Vulnerable to CybercrimeThe healthcare sector is especially susceptible to ever-evolving cybercrimes, says attorney Jason G. Weiss, a former FBI special agent and forensics expert, who describes critical steps to take to avoid falling victim....more0minPlay
FAQs about Healthcare Information Security Podcast:How many episodes does Healthcare Information Security Podcast have?The podcast currently has 3,412 episodes available.