Topic archive
Cybersecurity & Privacy
25 articles sorted by date.
ArticleCISOs Jack Kufahl and Greg Garneau on Building a Cyber Legacy, Hiring for Curiosity and Ending the “Whack-a-Mole” Mentality
Article“How Do We Appeal to People?”: CISO Chase Franzen On Sharp Healthcare’s Unique Approach to Cybersecurity Education
ArticlePreparing For The Storm: Brian Zegers and Aaron Heath Chart a Path for Improving Cybersecurity
Article“Fighting as Independents”: Chris Plummer On Silos, Budgets and Other Cybersecurity Hurdles
ArticleDennis Leber On Why CISOs Are Being Pigeon-Holed – And How They Can Break Free
ArticleFrom ‘No-Bots’ to Partners: CISO James Bowie on the Elevated Role of Cybersecurity Teams
Article“It’s a Program, Not a Project”: Heather Costa on the Necessary Shift from Disaster Recovery to Resilience
Article“Security Is About Trust”: How CISO Gary Chan Uses Mind Games and Personalization to Safeguard Data
Article“No Organization Is Bulletproof”: CISTO Steven Ramirez Discusses Renown’s Layered Security Approach
Article"We Can't Let the Firehouse Burn Down": Intermountain's Matt Christensen Offers Cybersecurity Guidance
Article“Security Is a Tax”: Duc Lai Discusses the Misconceptions and Challenges Facing CISOs
ArticleThe “Beginning of the Journey”: CISO Erik Decker on How Standardization and Collaboration Can Boost Security
ArticleFrom the Battlefield to the Boardroom: How Military Experience Can Propel Healthcare Leaders
Article“All of Healthcare Is Vulnerable”: Three Cyber Leaders Discuss Strategies and Resources That Can Protect Data
Article“Why We Exist”: CISOs Share Thoughts on the Importance of Education, Resilience and Collaboration
ArticleHealthcare Cybersecurity Technology with Proofpoint
ArticlePreparing a Security Posture with Proofpoint
ArticleThe Fight Against Cyber Criminals: Health IT Experts Explore the 2021 Cybersecurity Landscape
ArticleHealthcare IT Cybersecurity and Digital Solutions with CIO Kristin Myers
ArticleUnderstand the Rising Healthcare Cybersecurity Risks with CISO Mitch Parker
ArticleProtecting Health Systems from Phishing Attacks with Proofpoint