Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Digital Sovereignty & Cloud Adoption Spandan Mahapatra, TCS HiTech; Ganesh Subramanya, TCS Cybersecurity; Eddye Dibar, IDC; Romain Deslorieux, Thales The digitalisation of services has accelerated in the past two years, leveraging cloud scalability and innovation. With that, the concept of digital s... 6 months ago | 49 mins Protect Patient Data and Systems from Third-Party Risk Tony Howlett, SecureLink's Previous CISO Despite cybersecurity being a significant area of concern, healthcare organizations are, now more than ever, needing to rely on a higher number of thi... 5 months ago | 55 mins Protect Your Organization from Third-Party Risk Justin Strackany, Chief Customer Officer at SecureLink and Tony Howlett, CISO at SecureLink While Cybersecurity continues to be a significant area of concern, healthcare organizations are, now more than ever, relying on a higher number of thi... 5 months ago | 58 mins A Strong Security Posture for Healthcare Remote Access Tony Howlett, SecureLink's Previous CISO Healthcare organizations rely on remote vendors and business associates to provide reliable and consistent support for medical technology while also n... 5 months ago | 51 mins Alleviate Vendor Remote Access Security Nightmares Justin Strackany, Chief Customer Officer at SecureLink and Tony Howlett, CISO at SecureLink Cybersecurity continues to be a significant area of concern, with a higher frequency of multi-million dollar, potentially deadly, security breaches – ... 5 months ago | 59 mins How to Alleviate Third-Party Security Nightmares Justin Strackany, Chief Customer Officer at SecureLink and Tony Howlett, CISO at SecureLink Cybersecurity continues to be a significant area of concern, with a higher frequency of multi-million dollar, potentially deadly, security breaches – ... 5 months ago | 59 mins Simplifying Third-Party Remote Access to Optimize Care Tony Howlett, SecureLink's Previous CISO Healthcare organizations often face challenges between ensuring that they are providing quick or immediate access to clinical applications so that pat... 5 months ago | 48 mins How to Alleviate Healthcare Third-Party Data Breach Risk Justin Strackany, Chief Customer Officer at SecureLink and Tony Howlett, CISO at SecureLink Because of the reliance on third-party mission-critical technologies, healthcare organizations put themselves at risk by allowing support and maintena... 5 months ago | 52 mins How to Guard Healthcare Information with Device Control and Data Encryption Eric Ogren, Founder & Principal Analyst of The Ogren Group, and Chris Merritt, Solution Marketing Director at Lumension The need to protect digitized health information is a top priority in the healthcare industry. HIPAA and the HITECH Act put pressure on your organiza... 10 years ago | 61 mins Encryption Key Management Simplified Liz Townsend, Director of Business Development, Townsend Security Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security p... 6 years ago | 37 mins Load more