Data Breach Today Podcast

PODCAST · business

Data Breach Today Podcast

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

  1. 1000

    Built for Healthcare Compliance: Identity Strategies That Reduce Cyber Risk

    Join Matthew Radcliffe & Rob Sebaugh - as we explore how to fix security gaps in privacy for healthcare organizations.

  2. 999

    Healthcare Identity Security: What to Expect From a Solution

    What are the key elements of a successful identity security program, and what are common pitfalls organizations experience when launching one? SailPoint healthcare experts Matthew Radcliffe and Rob Sebaugh detail myths and realities of today's cloud-based identity security deployment strategies.

  3. 998

    Putting Cyberthreat Intelligence Data Into Action

    How can CISOs put the cyberthreat intelligence data they receive into practice? Kunal Sehgal, former director of global cyber resilience at Standard Chartered Bank, discusses how different industries use cyberthreat intelligence and explains misconceptions about sharing information.

  4. 997

    Connected Fitness Devices: The Growing Security Risks

    At-home fitness gear and other connected health devices pose growing potential security and privacy risks not only to the health data of consumers, but also to the environments in which individuals use these products, says Ondrej Krehel, CEO of cybersecurity and digital forensics firm LIFARS LLC.

  5. 996

    The Evolution of Email Security

    Ransomware, phishing, extortion scams - they all are popular now with COVID-19 themes. But socially-engineered attacks were already on the rise before the pandemic, say Olesia Klevchuk and Nishant Taneja of Barracuda. They share insight on the evolution of cloud-based email defenses.

  6. 995

    Remote Workforce: Extending Access and Security

    Enterprises globally are suddenly challenged to support and secure the largest remote workforce in history. Michael Goldgof of Barracuda shares insight on how to scale up this capacity securely, maximizing existing tools.

  7. 994

    New Study: Cloud Confidence, Maturity on the Rise

    Cloud maturity and confidence are growing, but security leaders are still reluctant to host highly sensitive data in the cloud. These are findings of a new Barracuda Networks survey. Chris Hill and Gemma Allen of Barracuda explore the results and what they mean.

  8. 993

    'Zero Trust': Can It Be Defined?

    "Zero trust" is arguably the cybersecurity buzzword of 2019, but what exactly does it mean? Jack Koons of Unisys provides his perspective.

  9. 992

    Complying with Australia's Breach Notification Mandates

    To prepare to comply with Australia's new breach notification law, which goes into effect in February, organizations should start reviewing their cybersecurity posture and incidence response mechanisms, says Leonard Kleinman, RSA's chief cybersecurity advisor-APJ.

  10. 991

    Healthcare Cybersecurity: The New Strategy

    From ransomware to targeted social engineering attacks, the threats to healthcare entities have changed enormously. Isn't it time for healthcare's cybersecurity strategy to change, too? That's the premise of Optum's Aaron Rinehart.

  11. 990

    Why Asia-Pacific Lags in Data Breach Detection

    Why is the Asia-Pacific region lagging far behind Europe and the United States in detecting data breaches? Rob van der Ende, vice president at FireEye's Mandiant, analyzes the results of the firm's new M-Trends Report 2016 for the Asia-Pacific Region and pinpoints breach detection shortcomings.

  12. 989

    Breach Response: Fighting Persistent Intruders

    Because hackers often find a way to stick around or repeat their network intrusions after remediation efforts are completed, organizations need to ramp up their "continuous detection" efforts, says security expert Wendi Whitmore of CrowdStrike.

  13. 988

    Health Data Protection: Overlooked Steps

    Data security expert Kate Borten, a former CISO who's a featured speaker at the June 11 Healthcare Information Security Summit in Boston, warns healthcare organizations against overlooking key data protection steps.

  14. 987

    Preventing Breaches by New Clinicians

    As the next wave of medical school graduates begins clinical training at healthcare organization across the U.S., it's critical these new clinicians be prepared to protect patient privacy, says healthcare attorney and professor Julie Agris.

  15. 986

    Mega-Breaches: Notification Lessons

    Massive breaches, such as the recent hacker attack on health insurer Anthem, highlight why it's important for organizations to understand their breach notification obligations under state laws as well as HIPAA, says attorney Brad Rostolsky.

  16. 985

    Protecting Employee Health Data

    The recent hack attacks targeting Sony Pictures and the U.S. Postal Service illustrate why all organizations - and not just healthcare entities - need to make safeguarding health-related information a top priority, says attorney Susan A. Miller.

  17. 984

    Defending Against Health Data Hacks

    Because the healthcare sector is a growing target for cybercriminals, organizations must implement security practices that look beyond HIPAA compliance and also address business associate risks, says risk management expert Kenneth Peterson.

  18. 983

    10 Risks: Internet of Things Security

    By bundling insecure Web, network, cloud and mobile interfaces, and rushing to market, Internet of Things device makers are compounding the breach risks facing consumers, warns HP's Daniel Miessler.

  19. 982

    EU Prepares Tough Breach Notification Law

    The EU is expected to approve in October an updated data protection law that spells out uniform breach notification requirements, security expert Jacky Wagner explains. The measure would apply to any business that targets Europeans.

  20. 981

    How Vendor Management Prevents Breaches

    To help prevent data breaches involving business associates, healthcare organizations need to develop vendor management programs with razor-sharp requirements, says risk management expert Rocco Grillo.

  21. 980

    Thwarting Cybercrime in Healthcare

    Healthcare organizations are becoming a bigger target for cybercriminals because so much more clinical and financial information is now stored in potentially vulnerable information systems, says security expert Mac McMillan.

  22. 979

    Impact of Target Breach in Healthcare

    In the wake of the Target breach, the University of Pittsburgh Medical Center has ramped up Internet monitoring to detect early if the organization is a target for attacks, says John Houston, UPMC's security and privacy leader.

  23. 978

    Breaches: Avoiding Legal Woes

    Healthcare organizations can take several key steps to help avoid the scrutiny of their state's attorney general and defend against possible class action lawsuits in the aftermath of data breaches, says privacy attorney David Navetta.

  24. 977

    Stopping Laptop Breaches: Key Steps

    The ongoing epidemic of health data breaches involving unencrypted laptops demonstrates why many healthcare organizations need to conduct more meaningful risk assessments, says security expert Dan Berger.

  25. 976

    Why Cyber-Attack Drills Are Important

    The healthcare industry is becoming a bigger target for cybercriminals, so cyber-attack drills planned for this year are an important step toward identifying security best practices, says Ray Biondo, CISO of insurer Health Care Service Corp.

  26. 975

    Tracking Who Accesses Data Via HIEs

    Providing patients with more transparency into who's electronically requesting their health information can not only improve data privacy, but also help patients catch record errors and ID theft, says David Staggs, a participant in a new pilot.

  27. 974

    Breach Notification: Critical Issues

    Despite the new instructions on breach notification in the HIPAA Omnibus Rule, there's still plenty of uncertainty about what constitutes a "compromise" of data that triggers notification, says privacy attorney Adam Greene.

  28. 973

    Assessing Breaches: Four Key Factors

    Under the HIPAA Omnibus Rule, security incidents are presumed to be reportable data breaches unless healthcare organizations demonstrate through a four-factor assessment that risks are low, explains privacy expert Kate Borten.

  29. 972

    How to Keep Mobile Health Data Secure

    Kathryn Marchesini, a privacy adviser at the Office of the National Coordinator for Health IT, outlines the three most important steps healthcare organizations should take to avoid breaches of information on mobile devices.

  30. 971

    Inside a HIPAA Breach Investigation

    Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.

  31. 970

    Practical Approach to Security

    The UK Information Commissioner's Office has released a new security guide for small and midsized businesses. Simon Rice of the ICO discusses the guide and how to use it to avoid being breached.

  32. 969

    Creating a Malware Intel Sharing System

    Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.

  33. 968

    Post-Breach PR: Lessons Learned

    One of the biggest mistakes companies make after a major data breach is communicating with the news media, consumers and others before all the facts are clear, says attorney Ronald Raether.

  34. 967

    Omnibus HIPAA Package Progresses

    An omnibus package of regulations that includes a final version of extensive HIPAA modifications, which have been pending since 2010, as well as a final version of the HIPAA breach notification rule has moved one major step closer to completion.

  35. 966

    Rallying Support for Security Investments

    Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.

  36. 965

    Sizing Up Impact of Class Action Suits

    High-profile class action lawsuits filed in the wake of major health information breaches will prove to be a strong catalyst for ramped up data security, a panel of attorneys says.

  37. 964

    Encryption's Role in Breach Prevention

    One reason why encryption is not more broadly used in healthcare is that so many organizations lack an updated risk assessment that identifies the role the technology can play in preventing breaches, says attorney Amy Leopard.

  38. 963

    How to Prevent a Data Breach

    The first step toward avoiding a data breach: Be aware of and learn from other organizations' mistakes. Listen to hear attorney David Szabo's top three tips for breach prevention and detection.

  39. 962

    How to 'Frame' Breach Notifications

    Notifying patients about a healthcare information breach requires a "difficult balancing act" by entities to ensure that risks are not exaggerated, says attorney Robert Belfort, an expert in HIPAA compliance, fraud and abuse.

  40. 961

    HIPAA Audit Prep and Breach Prevention

    One good way to prepare for a HIPAA compliance audit is to read a recent government report that identified vulnerabilities that could lead to breaches, says attorney Timothy McCrystal.

  41. 960

    HIPAA Audits: A Guidance Source

    One good way to prepare for a HIPAA compliance audit is to read a recent government report that identified vulnerabilities discovered in seven audits, says attorney Timothy McCrystal.

  42. 959

    HIPAA Rules Delay Creates Challenges

    The ongoing delay in the release of final versions of HIPAA modifications and the HIPAA breach notification rule makes it more difficult for healthcare organizations to set information security investment priorities, says hospital privacy officer Kari Myrold.

  43. 958

    Security Spending Up at Rural Hospital

    Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.

  44. 957

    How to Build a Culture of Privacy

    Staff training, aggressive breach prevention efforts and strong sanctions for violating policies are key to creating a corporate culture that values privacy and security, says Alan Dowling, the new CEO of the American Health Information Management Association.

  45. 956

    Assessing Security Incidents

    Healthcare organizations need to improve the methods they use to objectively assess the severity of a security incident and whether it should be reported, says David Parks, a privacy officer and attorney.

  46. 955

    Managing Business Associates

    When it comes to managing relationships with business associates to help with HITECH Act compliance, healthcare organizations could learn some lessons from the banking industry.

  47. 954

    A Breach Prevention Checklist

    Interview with Christopher Hourihan, manager, development and programs, Health Information Trust Alliance

  48. 953

    Breach Prevention, Notification Insights

    Interview with Kathryn Roe of The Health Law Consultancy

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

HOSTED BY

DataBreachToday.com

CATEGORIES

URL copied to clipboard!