Identity and Access Management for Healthcare

Sept. 24, 2019
Ten years ago, most health system information technology leaders didn’t have Identity and Access Management at the top of their priority lists. But today most CIOs and CISOs recognize the need for a detailed and sophisticated IAM strategy.
Imprivata 5d4c30c41f8f3

What Health IT Security Leaders Should Expect 

Panel Discussion 

Ten years ago, most health system information technology leaders didn’t have Identity and Access Management at the top of their priority lists. Provisioning and deprovisioning was primarily a manual operation, done by the IT staff. But today most CIOs and CISOs recognize the need for a detailed and sophisticated IAM strategy. Join us for this panel discussion and get industry expert input on what changed and what’s next:

  • Escalating enforcement of HIPAA and HITECH mandates
  • Increasingly grievous cyber security threats
  • Compliance and efficiency requirements for EPCS