Healthcare Information Security Podcast show

Healthcare Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 William Bria M.D.: Physicians and Data Security | File Type: audio/mpeg | Duration: Unknown

To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep clinical information secure. In this interview, William Bria, M.D., chief medical informatics officer at Shriners Hospitals for Children, describes how the organization's 22 charity care hospitals are striving to provide doctors with easy access to a wealth of clinical information while minimizing the risk of privacy violations. Dr. Bria, founder and president of the Association of Medical Directors of Information Systems (AMDIS), also describes in detail the organization's use of: Two-factor authentication, including smart cards, at the hospitals; An additional authentication layer (codes generated by hardware tokens) for physicians accessing systems remotely; and New secure messaging technology that automatically encrypts e-mails detected to contain private information.

 Charles Christian: The Security Challenges of Community Hospitals | File Type: audio/mpeg | Duration: Unknown

How do security leaders at community hospitals address data security challenges such as compliance with the HITECH Act? Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up many data security tasks among the members of his team, each of whom also are multi-taskers. In this interview, Christian, the former chairman of the Healthcare Information and Management Systems Society (HIMSS), describes the: Creation of a security breach notification plan to comply with the HITECH Act; Acquisition of an identity management system; Encryption of all data that goes "outside the building;" and Prohibition of storage of patient data on laptops. He also provides a real-world example of the value of an intrusion detection system that immediately pinpointed the room where someone visiting a patient unplugged a PC and plugged his laptop into the hospital's network.

 Charles Christian: The Security Challenges of Community Hospitals | File Type: audio/mpeg | Duration: Unknown

How do security leaders at community hospitals address data security challenges such as compliance with the HITECH Act? Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up many data security tasks among the members of his team, each of whom also are multi-taskers. In this interview, Christian, the former chairman of the Healthcare Information and Management Systems Society (HIMSS), describes the: Creation of a security breach notification plan to comply with the HITECH Act; Acquisition of an identity management system; Encryption of all data that goes "outside the building;" and Prohibition of storage of patient data on laptops. He also provides a real-world example of the value of an intrusion detection system that immediately pinpointed the room where someone visiting a patient unplugged a PC and plugged his laptop into the hospital's network.

 Charles Christian: The Security Challenges of Community Hospitals | File Type: audio/mpeg | Duration: Unknown

How do security leaders at community hospitals address data security challenges such as compliance with the HITECH Act? Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up many data security tasks among the members of his team, each of whom also are multi-taskers. In this interview, Christian, the former chairman of the Healthcare Information and Management Systems Society (HIMSS), describes the: Creation of a security breach notification plan to comply with the HITECH Act; Acquisition of an identity management system; Encryption of all data that goes "outside the building;" and Prohibition of storage of patient data on laptops. He also provides a real-world example of the value of an intrusion detection system that immediately pinpointed the room where someone visiting a patient unplugged a PC and plugged his laptop into the hospital's network.

 Information Security Career Predictions - David Foote on What's Hot and Why | File Type: audio/mpeg | Duration: Unknown

Information security is the hot career option for professionals in 2010 and beyond. This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses: the security careers "bubble" and how it began; the wave that has driven the surge in security jobs; predictions for 2010-2012. Foote has long been one of the nation's leading industry analysts tracking, analyzing and reporting on IT workforce management and compensation practices, trends and issues. His columns, articles and contributions appear regularly in dozens of publications. As Foote Partners' CEO and Chief Research Officer since 1997, David leads a senior team of experienced former McKinsey & Company, Gartner, META Group, and Towers Perrin analysts and consultants, and former HR, IT, and business executives, in advising governments and corporations worldwide on increasing performance and managing IT's impact on their businesses and customers. Prior to co-founding Foote Partners in 1997, David was an analyst and consultant with Gartner and META Group, co-founding and directing META's executive service for Chief Information Officers and leading the firm's IT Human Capital Management and Compensation research practices.

 Information Security Career Predictions - David Foote on What's Hot and Why | File Type: audio/mpeg | Duration: Unknown

Information security is the hot career option for professionals in 2010 and beyond. This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses: the security careers "bubble" and how it began; the wave that has driven the surge in security jobs; predictions for 2010-2012. Foote has long been one of the nation's leading industry analysts tracking, analyzing and reporting on IT workforce management and compensation practices, trends and issues. His columns, articles and contributions appear regularly in dozens of publications. As Foote Partners' CEO and Chief Research Officer since 1997, David leads a senior team of experienced former McKinsey & Company, Gartner, META Group, and Towers Perrin analysts and consultants, and former HR, IT, and business executives, in advising governments and corporations worldwide on increasing performance and managing IT's impact on their businesses and customers. Prior to co-founding Foote Partners in 1997, David was an analyst and consultant with Gartner and META Group, co-founding and directing META's executive service for Chief Information Officers and leading the firm's IT Human Capital Management and Compensation research practices.

 Information Security Career Predictions - David Foote on What's Hot and Why | File Type: audio/mpeg | Duration: Unknown

Information security is the hot career option for professionals in 2010 and beyond. This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses: the security careers "bubble" and how it began; the wave that has driven the surge in security jobs; predictions for 2010-2012. Foote has long been one of the nation's leading industry analysts tracking, analyzing and reporting on IT workforce management and compensation practices, trends and issues. His columns, articles and contributions appear regularly in dozens of publications. As Foote Partners' CEO and Chief Research Officer since 1997, David leads a senior team of experienced former McKinsey & Company, Gartner, META Group, and Towers Perrin analysts and consultants, and former HR, IT, and business executives, in advising governments and corporations worldwide on increasing performance and managing IT's impact on their businesses and customers. Prior to co-founding Foote Partners in 1997, David was an analyst and consultant with Gartner and META Group, co-founding and directing META's executive service for Chief Information Officers and leading the firm's IT Human Capital Management and Compensation research practices.

 Cisco Security Report: Malware, Social Media are Top Risks | File Type: audio/mpeg | Duration: Unknown

Malware is increasingly sophisticated, and social media are the common new venues for attacks. These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing: Top trends and threats; The risks to specific vertical industries and government agencies; The message to information security professionals looking to stay ahead of the threats. Peterson, Chief Security Researcher, is also a Cisco Fellow -- a position that is reserved for individuals whose technical contribution has made a material impact not only within Cisco, but also in the industry as a whole. As a security technology evangelist, Peterson leads research projects to understand cutting-edge criminal attacks and business models and developing the technologies to combat them. Peterson chairs the technical committee for the Messaging Anti-Abuse Working Group (MAAWG) and the authentication committee for the Authentication and Online Trust Alliance. He is a frequent speaker at industry conferences, including RSA, Gartner, Networkers and AusCe

 Cisco Security Report: Malware, Social Media are Top Risks | File Type: audio/mpeg | Duration: Unknown

Malware is increasingly sophisticated, and social media are the common new venues for attacks. These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing: Top trends and threats; The risks to specific vertical industries and government agencies; The message to information security professionals looking to stay ahead of the threats. Peterson, Chief Security Researcher, is also a Cisco Fellow -- a position that is reserved for individuals whose technical contribution has made a material impact not only within Cisco, but also in the industry as a whole. As a security technology evangelist, Peterson leads research projects to understand cutting-edge criminal attacks and business models and developing the technologies to combat them. Peterson chairs the technical committee for the Messaging Anti-Abuse Working Group (MAAWG) and the authentication committee for the Authentication and Online Trust Alliance. He is a frequent speaker at industry conferences, including RSA, Gartner, Networkers and AusCe

 Cisco Security Report: Malware, Social Media are Top Risks | File Type: audio/mpeg | Duration: Unknown

Malware is increasingly sophisticated, and social media are the common new venues for attacks. These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing: Top trends and threats; The risks to specific vertical industries and government agencies; The message to information security professionals looking to stay ahead of the threats. Peterson, Chief Security Researcher, is also a Cisco Fellow -- a position that is reserved for individuals whose technical contribution has made a material impact not only within Cisco, but also in the industry as a whole. As a security technology evangelist, Peterson leads research projects to understand cutting-edge criminal attacks and business models and developing the technologies to combat them. Peterson chairs the technical committee for the Messaging Anti-Abuse Working Group (MAAWG) and the authentication committee for the Authentication and Online Trust Alliance. He is a frequent speaker at industry conferences, including RSA, Gartner, Networkers and AusCe

 Marcus Ranum: The Biggest Security Threats Getting the Least Attention | File Type: audio/mpeg | Duration: Unknown

Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals. A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare. In an exclusive interview, Ranum discusses: The biggest security concerns of 2010; Which threats get the least attention; Why penetration testing is often a waste. Ranum, since the late 1980s, has designed a number of groundbreaking security products including the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall and NFR's Network Flight Recorder intrusion detection system. He has been involved in every level of operations of a security product business, from developer, to founder and CEO of NFR. Marcus has served as a consultant to many FORTUNE 500 firms and national governments, as well as serving as a guest lecturer and instructor at numerous high-tech conferences. In 2001, he was awarded the TISC "Clue" award for service to the security community, and also holds the ISSA lifetime achievement award. In 2005 he was awarded Security Professional of the Year by Techno Security Conference.

 Marcus Ranum: The Biggest Security Threats Getting the Least Attention | File Type: audio/mpeg | Duration: Unknown

Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals. A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare. In an exclusive interview, Ranum discusses: The biggest security concerns of 2010; Which threats get the least attention; Why penetration testing is often a waste. Ranum, since the late 1980s, has designed a number of groundbreaking security products including the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall and NFR's Network Flight Recorder intrusion detection system. He has been involved in every level of operations of a security product business, from developer, to founder and CEO of NFR. Marcus has served as a consultant to many FORTUNE 500 firms and national governments, as well as serving as a guest lecturer and instructor at numerous high-tech conferences. In 2001, he was awarded the TISC "Clue" award for service to the security community, and also holds the ISSA lifetime achievement award. In 2005 he was awarded Security Professional of the Year by Techno Security Conference.

 Marcus Ranum: The Biggest Security Threats Getting the Least Attention | File Type: audio/mpeg | Duration: Unknown

Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals. A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare. In an exclusive interview, Ranum discusses: The biggest security concerns of 2010; Which threats get the least attention; Why penetration testing is often a waste. Ranum, since the late 1980s, has designed a number of groundbreaking security products including the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall and NFR's Network Flight Recorder intrusion detection system. He has been involved in every level of operations of a security product business, from developer, to founder and CEO of NFR. Marcus has served as a consultant to many FORTUNE 500 firms and national governments, as well as serving as a guest lecturer and instructor at numerous high-tech conferences. In 2001, he was awarded the TISC "Clue" award for service to the security community, and also holds the ISSA lifetime achievement award. In 2005 he was awarded Security Professional of the Year by Techno Security Conference.

 ID Theft Threats to Watch in 2010 | File Type: audio/mpeg | Duration: Unknown

Interview with Jay Foley of the Identity Theft Resource Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive interview, Foley discusses: The major ID theft threats and trends for 2010; The industries most at risk; What information security professionals can do to help prevent ID theft. Responding to an explosive rise in identity theft crimes, Jay and Linda Foley established the Identity Theft Resource Center (ITRC) in 1999 in order to provide education and victim assistance to consumers and businesses. As Executive Director of the ITRC, Jay is today recognized nationally as an expert on identity theft issues. Frequently addressing national, state and community organizations, Jay travels throughout the United States providing training for businesses, consumers and law enforcement. He has appeared before state legislatures and in Congress recommending new laws to protect against the crime of identity theft and he is a regular on San Diego news programs.

 ID Theft Threats to Watch in 2010 | File Type: audio/mpeg | Duration: Unknown

Interview with Jay Foley of the Identity Theft Resource Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive interview, Foley discusses: The major ID theft threats and trends for 2010; The industries most at risk; What information security professionals can do to help prevent ID theft. Responding to an explosive rise in identity theft crimes, Jay and Linda Foley established the Identity Theft Resource Center (ITRC) in 1999 in order to provide education and victim assistance to consumers and businesses. As Executive Director of the ITRC, Jay is today recognized nationally as an expert on identity theft issues. Frequently addressing national, state and community organizations, Jay travels throughout the United States providing training for businesses, consumers and law enforcement. He has appeared before state legislatures and in Congress recommending new laws to protect against the crime of identity theft and he is a regular on San Diego news programs.

Comments

Login or signup comment.