Privacy & Security
<p>Ali Youssef, a cybersecurity director at Henry Ford Health, says specialized tools can detect and limit attacks before they spread, but health systems should take the approach of assuming that bad actors are already on their network to be able to react quickly.</p>
<p>
</p>
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">Janice Reese, an advisory member of the HSCC Cybersecurity Working Group, discusses data security for healthcare mergers and acquisitions, and moving patient data from legacy systems into a single, secure source of truth.</span></span></span></p>
<p>As more patients receive hospital care at home using digital health devices, Kevin Littlefield, principal for cybersecurity at MITRE, talks about the existing and upcoming guidance on how hospitals can apply privacy and security mitigations within their various implementations.</p>
<p>Erik Decker, vice president and CISO at Intermountain Health and chair of the Health Sector Council's Cybersecurity Working Group, discusses the group's collaboration with the U.S. government to support healthcare data security mandates.</p>
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">Security education and auditing can help healthcare organizations defend against insider data breaches, according to Dr. Eric Liederman, director of medical informatics at Kaiser Permanente.</span></span></span></p>
<p>Dr. Benoit Desjardins, professor at the University of Pennsylvania Medical Center, discusses ways hackers can access medical records from understaffed healthcare organizations – and how those organizations can best mitigate their cyber risk.</p>
<p>According to Dr. Brian Anderson, chief digital health physician at MITRE, hackers are using AI models to write code for attacks. While defensive AI tools can monitor networks for malicious traffic, humans should be part of the process.</p>
<p> </p>
The settlement concludes two OCR investigations initiated from a large breach report and a media article regarding a separate security incident.
<p>Eighteen months after an advanced Ryuk ransomware strike, the Virginia orthopedic practice recovered patient data, even when people said it would be impossible, says CIO Terri Ripley.</p>
<p> </p>
<div style="position: relative; display: block; max-width: 100%;">
<div style="padding-top: 56.