This Week Health 5 Years

September 8, 2021: We all log in to our machines to get started with our day. While this used to be just a terminal at your desk or workstation, the devices are with us all the time. Admission criteria for backup, compute, network, and storage relies on a consistent authentication model. Role-based access criteria is even more important as directory authentication is scaled and shared. Development of a consistent approach towards the development of controls will provide for an authoritative source of resources to access and control systems. As the access model for healthcare evolves, are we seeing steps taken that are going to change how we interact with technology? There have been a lot of breaches reported in the media - not just healthcare, but surrounding every organization in the world - is this the starting-point for our global remediation?

Join our webinar “Coming Through a Ransomware Event - Best Practices and Lessons Learned” on Thursday, October 7th at 11:00 AM eastern time. We are going to take a unique look at the Sky Lakes Medical Center ransomware event with guests:

  • John Gaede, Director of Information Services at Sky Lakes Medical Center
  • Lee Milligan, Vice President of Medical Informatics at Asante
  • Matt Sickles, Solutions Architect at Sirius Computer Solutions

Contributors

Want to tune in on your favorite listening platform? Don't forget to subscribe!

Thank You to Our Show Sponsors

Our Shows

Keynote - This Week HealthSolution Showcase This Week Health
Newsday - This Week HealthToday in Health IT - This Week Health

Related Content

1 2 3 213
Amplify great thinking to propel healthcare forward and raise up the next generation of health leaders.

© Copyright 2023 Health Lyrics All rights reserved