lp-hippa-od.jpg

The healthcare industry is a prime target for threat actors, as it deals with a vast amount of highly sensitive data which needs to remain current and accurate, as life or death decisions may depend on it. In turn, healthcare records are a hot commodity on the Dark Web, often going for a far higher price than credit cards.

That’s why it’s no surprise that healthcare is a heavily regulated industry. Those who work in this vertical need to do things right, do things fast, and remain in compliance with legislation such as HIPAA and HITECH. That is a pretty tall order in itself; however, when combined with the fact that the most common threat actors in healthcare are insiders, it can paint a rather challenging picture.

Ultimately, HIPAA compliance failures and data breaches can end a healthcare provider’s business. Hear from Dr. Torsten George, Cyber Security Evangelist at Centrify as he:

  • Discusses healthcare cyber threat trends and challenges;
  • Outlines how to address these cyber threats by implementing an Identity-Centric Privileged Access Management (PAM) approach without adding to the burden of already overtaxed security personnel; and
  • Demonstrates how this helps achieve better HIPAA compliance while easing preparations for upcoming audits for IT compliance staff.

Equipped with this information, you’ll be able to establish the necessary security controls to avoid costly HIPAA compliance failures.

Speaker

Torsten George

Dr. Torsten George
Cybersecurity Evangelist
Centrify