PHI: How Many Devices Does It (Securely) Reside On
It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session, two security experts will offer insights on identifying, documenting and protecting the flow of sensitive data, such as PHI, through an organization. Attendees will learn how this effort ties back to an organizational risk assessment and reinforces the importance of properly protecting data, both in transit and at rest.
See Also: Healthcare Sector Threat Brief
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.