from 04:00 PM to 05:00 PM
All health care organizations are rapidly advancing towards the target of comprehensive electronic communication, whether for payment processing or sharing protected health information. Though greater emphasis has been the protection mechanisms for data transit, it is becoming clear the weakest links remain the end-points – the organizations themselves. The consequences of data breaches are increasingly costly, in both dollars and reputation; therefore, organizations should not simply wait for breaches to occur. Characteristically, protection mechanisms have been unplanned or fragmentary, tracking to lists and regulations, and most organizational security practices are built around responses.
The objective of this presentation will be to describe a disciplined information security management effort that includes aspects such as:
- Proper planning
- Disciplined implementation
- Pro-active change management
- Responsible assessment
The presentation will begin with a major impediment – the clarification of terminology which has led to confusion, and include the detailed descriptions of the manor management aspects. It will conclude with a comparison and discussion of the classic and redefined roles of information security.
Attendees will learn how carefully managed security programs and structures will reduce the potential for breach occurrences and meet the obligations of regulated environment. They will gain constructive suggestions for information security and technology management.