Artwork

Content provided by Makala Barsolona and Britton Burton | Sr Director of Product Strategy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Makala Barsolona and Britton Burton | Sr Director of Product Strategy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cyber Trust Falls: How Cybersecurity Enables Trust in Healthcare

40:55
 
Share
 

Manage episode 322770795 series 3052259
Content provided by Makala Barsolona and Britton Burton | Sr Director of Product Strategy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Makala Barsolona and Britton Burton | Sr Director of Product Strategy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Who can be trusted to protect sensitive healthcare information and systems amidst a daily barrage of breach events?

Healthcare cybersecurity and risk leaders must identify innovative ways to establish and maintain trust in the healthcare ecosystem through cybersecurity programs and functions. This includes being transparent about risk exposures, building relationships internally and externally, responding effectively to breaches, and adopting certification models like HITRUST and SOC 2.

In this episode of The CyberPHIx, we hear from Ed Dame, Chief Information Security Officer for Dasher Services, Inc.

Ed provides insights and wisdom from his years of experience as a CISO in building relationships and establishing trust. Questions covered in this session include:

  • Why is trust important in healthcare settings?
  • How can cybersecurity programs support and sustain trust?
  • What role does transparency play in building or eroding trust?
  • What are the boundaries of accountability for trust for healthcare CISOs including third- and fourth-party vendors?
  • What role do cybersecurity certifications like HITRUST play in establishing trust with the market?
  • What happens when trust is lost or damaged?
  • Is there a right and wrong way to respond to breaches that impacts trust?
  • What is the different between reacting and responding to cybersecurity incidents?
  • What is the role of emerging “zero trust” models and terminology in healthcare?
  continue reading

99 episodes

Artwork
iconShare
 
Manage episode 322770795 series 3052259
Content provided by Makala Barsolona and Britton Burton | Sr Director of Product Strategy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Makala Barsolona and Britton Burton | Sr Director of Product Strategy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Who can be trusted to protect sensitive healthcare information and systems amidst a daily barrage of breach events?

Healthcare cybersecurity and risk leaders must identify innovative ways to establish and maintain trust in the healthcare ecosystem through cybersecurity programs and functions. This includes being transparent about risk exposures, building relationships internally and externally, responding effectively to breaches, and adopting certification models like HITRUST and SOC 2.

In this episode of The CyberPHIx, we hear from Ed Dame, Chief Information Security Officer for Dasher Services, Inc.

Ed provides insights and wisdom from his years of experience as a CISO in building relationships and establishing trust. Questions covered in this session include:

  • Why is trust important in healthcare settings?
  • How can cybersecurity programs support and sustain trust?
  • What role does transparency play in building or eroding trust?
  • What are the boundaries of accountability for trust for healthcare CISOs including third- and fourth-party vendors?
  • What role do cybersecurity certifications like HITRUST play in establishing trust with the market?
  • What happens when trust is lost or damaged?
  • Is there a right and wrong way to respond to breaches that impacts trust?
  • What is the different between reacting and responding to cybersecurity incidents?
  • What is the role of emerging “zero trust” models and terminology in healthcare?
  continue reading

99 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide