Protecting Your Patient Data - What You Don't Know Can Hurt Them and YOU

This abstract has open access
Description of Session
A cyber security incident is inevitable for any technology platform. It is time to stop thinking in terms of "if" and start thinking "when," even for medical teams doing good in the world. Approaching cyber security in terms of "when" encourages us to develop cyber security policies and procedures that limit the extent of damage and reduces risk. This session will walk through the different types of actors in a cyber security attack, along with their motivations for targeting healthcare records. We'll explore the types of attacks and who is most vulnerable, along with the architectures, equipment, and set-ups that provide the most security. Finally, we'll talk through several short-term, mid-term, and long-term modifications your team can make to decrease your platform's security vulnerabilities. Several of these include operational compliance, technology choices, and usage policies.
Abstract ID :
GDHF5295
Select Session Type
Founder/CEO
,
Binary Bridge, SBC
CEO
,
Protocol 46

Abstracts With Same Type

Abstract ID
Abstract Title
Abstract Topic
Submission Type
Primary Author
GDHF11188
Digital Health for Healthcare Providers
Poster Presentation
Lt.-Col. Owais Mahmood Siddiqui
GDHF55184
Digital Health for Clients
Poster Presentation
Victoria Jennings
GDHF31104
Human Resource Capacity Building for Sustainable Digital Health Systems
Poster Presentation
Abigail Poluyi
GDHF3710
Digital Health for Healthcare Providers
Poster Presentation
Lauren Bellhouse
GDHF1694
Digital Health for Health Systems Managers
Poster Presentation
Ismail Wadembere
GDHF37189
Health Information Systems Architecture
Poster Presentation
Dr. Iniobong Ekong
GDHF71100
Digital Health for Healthcare Providers
Poster Presentation
Cara Silva
63 visits