Understanding the Perfect Storm of Vulnerabilities to Manage Cyberthreats
IoT, Ransomware, Human Factors of Cybersecurity, and Data Protection
No matter how robust your organization's security stack is, vulnerabilities to intrusions still exist. Unmanaged cyberthreats can compromise your organization’s ability to perform its mission by putting critical assets, data, and services at risk. As more and more organizations move toward the cloud, keeping track of where sensitive data resides becomes increasingly difficult putting increasing pressure on data security teams. Melissa Lawlor, Director of Security GRC, of Hackensack Meridian Health, Dr. Mauricio Angee, Chief Security Officer, of the University of Miami, and Michael Ebert, Partner at Guidehouse Cyber Security Leader, discuss how healthcare organizations can competently manage critical privacy and security issues.
With 875 security breaches last year only, representing over 61 million health records, and with the advent of patients becoming more directly involved with their own healthcare via the Internet, often with at-home acute care biomedical censoring devices attached to the cloud — being and staying HIPAA compliant is not only a challenge, it’s not enough these days. Coupled with new hospital medical devices coming online daily, like thermostats, oxygen vaults and other similar equipment, understanding foundational security controls is paramount to managing privacy. This adds significant complexity in data collection and management associated with these devices.
All this complexity necessitates the need for solid and adaptable security plans that can be tested so that any vulnerabilities can be remediated quickly. Listen to the podcast or watch the full interview (below) to hear how technology is changing and how to adapt processes and systems in place to improve access management and privileged access management.