Presented in partnership with ISMG: Watch Now Healthcare organizations invest billions of dollars in security solutions to safeguard sensitive patient data—but are those solutions working as intended? A 2020 report by Cybersecurity Ventures predicted that the...
NIST Report Spotlights Cyber, Privacy Risks in Genomic Data
A Multitude of Considerations for Entities As Use of Genomic Data Advances
Navigating Information Blocking Regulations in Healthcare Transactions
2023 has been a busy year for information blocking regulations: HHS ONC’s HTI-1 proposed rule in April (which was finalized on December 13, after this podcast was recorded), OIG’s final rule in June, and November’s proposed enforcement rule for health care providers....
Health care industry fights back against crackdowns on health data tracking
A Look at HITRUST Version 11: Everything You Need to Know
As organizations that are HITRUST certified, pursuing certification, or have been making plans to do so review the changes in version 11, there are many questions about what's new and how the changes will impact their current or planned certification. We recently sat...
A Blueprint for Success Part 3: Budget Pitfalls, Prioritizing Risk Management, and AI
In the last episode of this three-part series, Steve Cagle, Bob Chaput, and Mac McMillan return with an exploration of the common pitfalls in allocating cybersecurity budgets and transitions to a pivotal question: where should security leaders prioritize investments?...
Active Incident Response Planning: Find it, Fix it, and Go Forward
As healthcare continues to top the list of industries targeted by cyberattacks—and has the highest cost of a breach of all industries—healthcare covered entities can no longer approach cybersecurity from a “what if” perspective, but when. And, while proactive,...
How to Mitigate Gaps in Your Front Line of Cyber Defense
Managing Cybersecurity for Legacy Medical Devices
Healthcare delivery organizations managing medical devices have new guidance commissioned by the FDA for securing legacy devices in the field. We will be discussing this guidance and how it impacts healthcare risk management. Host: Kim Singletary, VP Solution...
A Blueprint for Success Part 2: Transforming Cybersecurity Culture
In the second episode of our three-part series, "Transforming Cybersecurity Culture," Steve Cagle, CEO of Clearwater Security and Compliance, continues the discussion with healthcare cybersecurity and compliance experts Mac McMillan and Bob Chaput. Building on the...