1. EachPod
EachPod

IoT, Ransomware, Human Factors of Cybersecurity, Data Protection and Tokenization - Understanding the Perfect Storm of Vulnerabilities to Manage Cyberthreats

Author
Michael Ebert, Melissa Lawlor, Mauricio Angee
Published
Thu 19 May 2022
Episode Link
https://www.digitalhealthtalks.com/episodes/iot-ransomware-human-factors-of-cybersecurity-data-protection-and-tokenization-understanding-the-perfect-storm-of-vulnerabilities-to-manage-cyberthreats-UHHiSSsR

HealthIMPACT Live Presents: IoT, Ransomware, Human Factors of Cybersecurity, Data Protection and Tokenization - Understanding the Perfect Storm of Vulnerabilities to Manage Cyberthreats 

Originally Published: Apr 7, 2022

YouTube Video: https://youtu.be/d-put3vQp7w

No matter how robust your organization's security stack is, vulnerabilities to intrusions still exist. Unmanaged cyberthreats can compromise your organization’s ability to perform its mission by putting critical assets, data, and services at risk. As more and more organizations move toward the cloud, keeping track of where sensitive data resides becomes increasingly difficult putting increasing pressure on data security teams. Recent events in healthcare IT show that a zero-trust security strategy is the only way to prevent successful security breaches and ensure no threat or vulnerability to the continuity of care model. In this session, health system security leaders discuss how to: 

Manage critical privacy and security issues healthcare organizations face 

Establish and optimize information security and privacy operations to be better prepared to address current — and future — IT risks 

Transitioning and securing data methods and devices – IoMT, IoT 

Data protection and tokenization 

Getting clear, readable data out of the healthcare environment

 

Mauricio Angee, AVP, Chief Information Security Officer, University of Miami Health System

Melissa Lawlor, CISSP, Director, IT Security GRC, Hackensack Meridian Health

Michael Ebert, Partner, Guidehouse

Share to: