cybersecurity
HIMSS24
Threat actors are increasingly using AI to generate hacking attempts and phishing scams. Jeff Webber, Intelliguard CTO, calls for cybersecurity vendors to create AI-powered solutions to fight these new threats.
FinThrive SVP and CISO Greg Surla discusses why providers should not rely on single vendors in RCM environments and how the Change Healthcare attack was a watershed moment.
HIMSS24
US Health and Human Services CISO La Monte Yarborough discusses the HHS 405(d) program, which provides free educational resources and cybersecurity best practices in English and Spanish for healthcare organizations of all sizes.
HIMSS24
Dave Bailey, VP, Consulting Services at Clearwater Security, recommends developing cybersecurity strategy around a framework like NIST 2.0 and working with leadership to get the necessary resources to address vulnerabilities.
HIMSS24
Lee Kim, senior principal, cybersecurity and privacy at HIMSS, discusses the new NIST Cybersecurity Framework 2.0, which offers specific implementation examples and granular guidance to help organizations manage and reduce cybersecurity risk.
The company, which tailors cybersecurity offerings to health systems and providers, also appointed its first chief executive officer, Geyer Jones.
Both small and large organizations have risk challenges and threat-monitoring gaps, but executives are increasingly recognizing that cybersecurity in healthcare is a strategic imperative central to patient safety, says Steve Cagle, CEO of Clearwater.
HIMSS24
Dr. Eric Liederman, CEO of CyberSolutionsMD, says technology providers should be required to use AI tools to find vulnerabilities in their products before they go to market.
HIMSS24
Senior director of the security operations center at Huntress, Max Rogers, speaks on achieving successful cybersecurity outcomes through effective monitoring.
HIMSS24
There are benefits to proactive cybersecurity strategies, says Philip Bradley, digital health strategist at HIMSS. He discusses how the INFRAM framework can guide organizations in maturing their infrastructure to protect data.