title

Healthcare Information Security Podcast

HealthcareInfoSecurity.com

3
Followers
0
Plays
Healthcare Information Security Podcast
Healthcare Information Security Podcast

Healthcare Information Security Podcast

HealthcareInfoSecurity.com

3
Followers
0
Plays
OVERVIEWEPISODESYOU MAY ALSO LIKE

Details

About Us

Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Latest Episodes

Robotic Process Automation: Security Essentials

Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.

-1 sjust now
Comments
Robotic Process Automation: Security Essentials

The Ultimate Missing Link in Cyber: Continuous Compromise Assessment

According to Ricardo Villadiego, Lumu Technologies' Founder and CEO, organizations are "sitting on a gold mine: their own data". Under the single premise that organizations should assume they are compromised and prove otherwise, Lumu seeks to empower enterprises to answer the most basic question: Is your organization talking with adversary infrastructure?

-1 s20 hours ago
Comments
The Ultimate Missing Link in Cyber: Continuous Compromise Assessment

IoT in Vehicles: The Trouble With Too Much Code

The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

-1 s1 days ago
Comments
IoT in Vehicles: The Trouble With Too Much Code

Open Source Vulnerabilities Cut Across Sectors

Large or small, enterprises from all sectors are dealing with the same vulnerabilities in open source code. The difference: the scale of the problem. DJ Schleen of Sonatype discusses insights from the latest ISMG roundtable dinner.

-1 s1 days ago
Comments
Open Source Vulnerabilities Cut Across Sectors

How Has FTC Data Security Enforcement Changed?

In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill.

-1 s1 days ago
Comments
How Has FTC Data Security Enforcement Changed?

Analysis: New ISO Privacy Standard

What's the purpose of ISO 27701, the new privacy extension to the ISO 27001 information security management standard? Matthieu Grall, CISO and DPO at SodiFrance, a French IT services company, who participated in development of 27701, explains the standard and discusses "privacy by design" compliance issues.

-1 s1 days ago
Comments
Analysis: New ISO Privacy Standard

Stung by Takedowns, Criminals Tap Distributed Dark Markets

Law enforcement success inevitably sparks criminals to become more innovative, including shifting from centralized markets - such as Hansa and Wall Street Market - to encrypted and distributed marketplaces, says the University of Surrey's Alan Woodward.

-1 s2 days ago
Comments
Stung by Takedowns, Criminals Tap Distributed Dark Markets

Making the Case for National Unique Patient ID

How might a national unique patient identifier improve the accuracy of patient record matching and potentially help address identity fraud? Julie Dooling of the American Healthcare Information Management Association - which has been lobbying for the development of such an ID - makes the case.

-1 s5 days ago
Comments
Making the Case for National Unique Patient ID

Analysis: Twitter's Phone Number Repurposing 'Mistake'

The latest edition of the ISMG Security Report analyzes Twitter's repurposing of user phone numbers for targeted advertising. Plus: A discussion of 5G security issues and findings of the Internet Organized Crime Threat Assessment.

-1 s6 days ago
Comments
Analysis: Twitter's Phone Number Repurposing 'Mistake'

Privacy: How Technology Is Outpacing Regulation

To ensure privacy is protected, governments need to make sure standards and regulations keep pace with the latest technology developments, including facial recognition and other forms of artificial intelligence, says Steven Feldstein, an associate professor at Boise State University.

-1 s1 weeks ago
Comments
Privacy: How Technology Is Outpacing Regulation

Latest Episodes

Robotic Process Automation: Security Essentials

Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.

-1 sjust now
Comments
Robotic Process Automation: Security Essentials

The Ultimate Missing Link in Cyber: Continuous Compromise Assessment

According to Ricardo Villadiego, Lumu Technologies' Founder and CEO, organizations are "sitting on a gold mine: their own data". Under the single premise that organizations should assume they are compromised and prove otherwise, Lumu seeks to empower enterprises to answer the most basic question: Is your organization talking with adversary infrastructure?

-1 s20 hours ago
Comments
The Ultimate Missing Link in Cyber: Continuous Compromise Assessment

IoT in Vehicles: The Trouble With Too Much Code

The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

-1 s1 days ago
Comments
IoT in Vehicles: The Trouble With Too Much Code

Open Source Vulnerabilities Cut Across Sectors

Large or small, enterprises from all sectors are dealing with the same vulnerabilities in open source code. The difference: the scale of the problem. DJ Schleen of Sonatype discusses insights from the latest ISMG roundtable dinner.

-1 s1 days ago
Comments
Open Source Vulnerabilities Cut Across Sectors

How Has FTC Data Security Enforcement Changed?

In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill.

-1 s1 days ago
Comments
How Has FTC Data Security Enforcement Changed?

Analysis: New ISO Privacy Standard

What's the purpose of ISO 27701, the new privacy extension to the ISO 27001 information security management standard? Matthieu Grall, CISO and DPO at SodiFrance, a French IT services company, who participated in development of 27701, explains the standard and discusses "privacy by design" compliance issues.

-1 s1 days ago
Comments
Analysis: New ISO Privacy Standard

Stung by Takedowns, Criminals Tap Distributed Dark Markets

Law enforcement success inevitably sparks criminals to become more innovative, including shifting from centralized markets - such as Hansa and Wall Street Market - to encrypted and distributed marketplaces, says the University of Surrey's Alan Woodward.

-1 s2 days ago
Comments
Stung by Takedowns, Criminals Tap Distributed Dark Markets

Making the Case for National Unique Patient ID

How might a national unique patient identifier improve the accuracy of patient record matching and potentially help address identity fraud? Julie Dooling of the American Healthcare Information Management Association - which has been lobbying for the development of such an ID - makes the case.

-1 s5 days ago
Comments
Making the Case for National Unique Patient ID

Analysis: Twitter's Phone Number Repurposing 'Mistake'

The latest edition of the ISMG Security Report analyzes Twitter's repurposing of user phone numbers for targeted advertising. Plus: A discussion of 5G security issues and findings of the Internet Organized Crime Threat Assessment.

-1 s6 days ago
Comments
Analysis: Twitter's Phone Number Repurposing 'Mistake'

Privacy: How Technology Is Outpacing Regulation

To ensure privacy is protected, governments need to make sure standards and regulations keep pace with the latest technology developments, including facial recognition and other forms of artificial intelligence, says Steven Feldstein, an associate professor at Boise State University.

-1 s1 weeks ago
Comments
Privacy: How Technology Is Outpacing Regulation