Healthcare Information Security: A Status Report

Healthcare Information Security: A Status Report

Join us for an exclusive briefing from RSA Conference 2013 for healthcare information security leaders.

Attendees will learn about healthcare info security trends identified in all-new global surveys and hear an expert analysis of key action items for the year ahead. Topics to be covered include:

  • The security implications of BYOD, social media and texting;
  • The key to a successful security training effort;
  • The role of encryption, on end-user devices as well as servers, in preventing breaches.

Background

More than 500 major health data breaches have been reported in the past three years, proof that many healthcare organizations still have a long way to go when it comes to data security. What are the key issues that need to be addressed?

Join us for a discussion of the status of healthcare information security and the outlook for the year ahead. Howard Anderson, news editor of the HealthcareInfoSecurity website, will offer highlights of an exclusive survey of security leaders and discuss trends for the year ahead with David Houlding, Intel's healthcare privacy and security lead architect. David will also share highlights from another recent survey of healthcare worker user experience with security and the workarounds they may use, such as personal devices/apps, social media and texting, that can drive non-compliance issues and risk.

The speakers address a wide range of important issues, including:

  • Top information security priorities for the year ahead;
  • Security technologies that healthcare organizations plan to implement - and why;
  • The critical security issues in the emerging areas of BYOD, social media and texting;
  • An assessment of current security training efforts, and how they could be improved;
  • The role of encryption, not just on end-user devices, but also on servers;
  • Evolving approaches to risk assessments.


Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.