Artwork

المحتوى المقدم من Makala Barsolona and Britton Burton | Sr Director of Product Strategy. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Makala Barsolona and Britton Burton | Sr Director of Product Strategy أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Cyber Trust Falls: How Cybersecurity Enables Trust in Healthcare

40:55
 
مشاركة
 

Manage episode 322770795 series 3052259
المحتوى المقدم من Makala Barsolona and Britton Burton | Sr Director of Product Strategy. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Makala Barsolona and Britton Burton | Sr Director of Product Strategy أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Who can be trusted to protect sensitive healthcare information and systems amidst a daily barrage of breach events?

Healthcare cybersecurity and risk leaders must identify innovative ways to establish and maintain trust in the healthcare ecosystem through cybersecurity programs and functions. This includes being transparent about risk exposures, building relationships internally and externally, responding effectively to breaches, and adopting certification models like HITRUST and SOC 2.

In this episode of The CyberPHIx, we hear from Ed Dame, Chief Information Security Officer for Dasher Services, Inc.

Ed provides insights and wisdom from his years of experience as a CISO in building relationships and establishing trust. Questions covered in this session include:

  • Why is trust important in healthcare settings?
  • How can cybersecurity programs support and sustain trust?
  • What role does transparency play in building or eroding trust?
  • What are the boundaries of accountability for trust for healthcare CISOs including third- and fourth-party vendors?
  • What role do cybersecurity certifications like HITRUST play in establishing trust with the market?
  • What happens when trust is lost or damaged?
  • Is there a right and wrong way to respond to breaches that impacts trust?
  • What is the different between reacting and responding to cybersecurity incidents?
  • What is the role of emerging “zero trust” models and terminology in healthcare?
  continue reading

99 حلقات

Artwork
iconمشاركة
 
Manage episode 322770795 series 3052259
المحتوى المقدم من Makala Barsolona and Britton Burton | Sr Director of Product Strategy. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Makala Barsolona and Britton Burton | Sr Director of Product Strategy أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Who can be trusted to protect sensitive healthcare information and systems amidst a daily barrage of breach events?

Healthcare cybersecurity and risk leaders must identify innovative ways to establish and maintain trust in the healthcare ecosystem through cybersecurity programs and functions. This includes being transparent about risk exposures, building relationships internally and externally, responding effectively to breaches, and adopting certification models like HITRUST and SOC 2.

In this episode of The CyberPHIx, we hear from Ed Dame, Chief Information Security Officer for Dasher Services, Inc.

Ed provides insights and wisdom from his years of experience as a CISO in building relationships and establishing trust. Questions covered in this session include:

  • Why is trust important in healthcare settings?
  • How can cybersecurity programs support and sustain trust?
  • What role does transparency play in building or eroding trust?
  • What are the boundaries of accountability for trust for healthcare CISOs including third- and fourth-party vendors?
  • What role do cybersecurity certifications like HITRUST play in establishing trust with the market?
  • What happens when trust is lost or damaged?
  • Is there a right and wrong way to respond to breaches that impacts trust?
  • What is the different between reacting and responding to cybersecurity incidents?
  • What is the role of emerging “zero trust” models and terminology in healthcare?
  continue reading

99 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع