Data Protection & Compliance in Your EHR: Epic

Hear Epic customer, Cooper University Health Care share how they protect the “crown jewels” of their facility – the patient information – by starting each day looking for the adversary.

Solving Shadow IT: Information Security and Governance Strategies

The cloud has empowered employees to circumvent IT and enabled shadow IT to pop-up throughout organizations of all sizes. It’s nearly impossible for the IT staff to get their arms around all of the different applications that are being downloaded by employees. Hear from one of the world’s leading CISOs, Gene Fredriksen, on how he has manages shadow IT

What’s at stake? Security, trust and the future of healthcare

Security threats to the healthcare industry have reached unprecedented levels. Insider “snooping” has been joined by an entourage of nefarious allies, including: nation state attacks, hacktivists, international identity theft rings, and ransomware. Cybersecurity solutions that provide faster, more efficient detection of anomalous activity are necessary to safeguard EHRs and healthcare applications.