Training

Governance & Risk Management , Healthcare , Identity Governance & Administration

OnDemand Panel | Securing Healthcare’s Digital Transformation: Provider and Vendor Perspectives

OnDemand Panel | Securing Healthcare’s Digital Transformation: Provider and Vendor Perspectives

The digital transformation occurring in healthcare has brought with it a wave of new information security and privacy considerations for hospitals and health systems and the technology companies that serve the industry. With third-party breaches at an all-time high, healthcare providers continue to increase their expectations and standards for vendors to safeguard patient data.

Tech leaders are responding by building cybersecurity and HIPAA compliance programs that reflect their commitment to keeping electronic protected health information (ePHI) secure. During this special panel discussion, Kezia Cook-Robinson, Senior Privacy Counsel for Verily Life Sciences, sister company to Google and an Alphabet company, and Jackie Mattingly, Chief Information Security Officer for Owensboro Health, will discuss how healthcare providers and technology companies can most effectively work together to secure the industry’s ongoing digital transformation. They will be joined by Jon Moore, Chief Risk Officer and Head of Consulting Services for Clearwater, who will offer perspective on provider/vendor data privacy and security dynamics, drawing on his experience working with organizations across the health IT ecosystem.

Discussion Topics Include:

  • How the rapid pace of digitization is impacting healthcare Information Security teams’ evaluation of potential technology investments
  • What leading technology companies are doing to address provider expectations regarding their ability to keep patient data secure
  • Steps that providers and vendors can take to minimize cybersecurity and HIPAA compliance risk

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.