WannaCry Threat Intelligence Briefing 17772 Event date: 5/16/2017 1:00 PM - 2:00 PM Export event Alyssa Thomas post on Monday, May 15, 2017 | Categories: Privacy and Security, Breach Mitigation & Response, HIT Events A HIStalk Webinar Sensato CEO and cybersecurity reseaercher John Gomez will present an HIStalk-sponsored free webinar on Tuesday, May 16 at 1:00 p.m. ET titled “WannaCry Threat Intelligence Briefing.” John will provide an in-depth analysis of the current state of WannaCry as well as a technical review of how it operates and possible go-forward cybersecurity impacts. John will also present technical and regulatory counter-measures you should consider, specific to healthcare organizations. John Gomez Mr. Gomez is currently the CEO of Sensato, a cyber-security and privacy healthcare company, JGo Labs, a product design and management consulting firm, and Group Espada, which provides counter-terrorism services. Previously, Mr. Gomez was the Chief Technology Officer/Co-President of Allscripts, a leading provider of healthcare information solutions. Mr. Gomez was also the CTO of Eclipsys and WebMD and worked at Microsoft in various capacities. Tags: cybersecurity privacy security Print Previous Article Health IT Privacy & Security Skill Sets Next Article Preventing and Dealing with Ransomware Attacks: How to Keep Your Data Safe Resource Links Click here to register for this webinar.Abstract During this webinar, John Gomez (a healthcare focused cybersecurity researcher) will provide an in-depth analysis of the current state of wannacry as well as a technical review of how it operates and possible go-forward cybersecurity impacts. John will also present technical and regulatory counter-measures you should consider, specific to healthcare organizations. Related Resources Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation, and Response - Session 4 Cybersecurity Incident Response Planning for Health Centers Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 3 Mitigating Cybersecurity Risk for RPM and Telehealth Programs Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 2 Health Center Hacking Combat and Breach Response Strategies Improving Health Center Cybersecurity: Risk Assessment, Breach Defense, Mitigation and Response - Session 1 Identifying and Assessing Cybersecurity Risks at Your Health Center Cybersecurity: Ask Me Anything Leave a comment Name: Please enter a name. Email: Please enter an email address. Please enter a valid email address. Comment: Please enter comment. I agree This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data. You must read and accept this rules. Add comment
Health Center Case Examples in Coding and Documenting Social Risks: Introduction Health Center Case Examples in Coding and Documenting Social Risks: Introduction Health Center Case Examples in Coding and Documenting Social Risks: Introduction
Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks
Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks Health Center Case Examples in Coding and Documenting Social Risks