Description of Session
A cyber security incident is inevitable for any technology platform. It is time to stop thinking in terms of "if" and start thinking "when," even for medical teams doing good in the world. Approaching cyber security in terms of "when" encourages us to develop cyber security policies and procedures that limit the extent of damage and reduces risk. This session will walk through the different types of actors in a cyber security attack, along with their motivations for targeting healthcare records. We'll explore the types of attacks and who is most vulnerable, along with the architectures, equipment, and set-ups that provide the most security. Finally, we'll talk through several short-term, mid-term, and long-term modifications your team can make to decrease your platform's security vulnerabilities. Several of these include operational compliance, technology choices, and usage policies.