HIMSS Episodes NOW on Demand 3/26/25
Catch these NOW On Demand recordings from HIMSS25 on Talking the Walk, Health UnaBASHEd, The Virtual Shift, Trending NOW, The Tate Chronicles, News You Can Use, Healthcare IT Today, and PopHealth Week.
Read MoreCatch these NOW On Demand recordings from HIMSS25 on Talking the Walk, Health UnaBASHEd, The Virtual Shift, Trending NOW, The Tate Chronicles, News You Can Use, Healthcare IT Today, and PopHealth Week.
Read MoreThis week on Healthcare NOW Radio – Recordings from HIMSS25 on Health Unabashed, The Virtual Shift, The Tate Chronicles, PopHealth Week, News You Can Use, and Talking the Walk.
Healthcare NOW Radio will be at HIMSS25 in booth 6832 Venetian L2. Stop by to see and hear these radio hosts and their guests Tuesday, Wednesday, and Thursday. See you in Vegas!
Missed our event? Watch the recording of, Use of AI in Healthcare and Its Cybersecurity Implications with experts Heather Randall, PhD, Lee Kim, JD, CISSP, CIPP/US FHIMSS, David Finn, CISA, CISM, CRISC, and CDPSE with moderator Matt Fisher, JD.
What is the impact of AI technologies on HIPAA, BAs and SRAs? Find out this Wednesday at our Virtual Panel Discussion on developing a framework for the responsible use and implementation of AI.
Wednesday, April 7, 2021 2:00 pm ET – This presentation brings two industry leaders to the table to discuss changes to HIPAA and how they align or don’t align, with overarching privacy trends, as well as how those changes can be implemented in the health care environment.
Lee Kim, Director, Privacy and Security for HIMSS North America, joins us on our next HIPAA Chat to share her insights on the topic of cyber security and discuss some of the results of a recent survey conducted by HIMSS.
By Lee Kim – Data breaches are happening with increasing frequency. There may even be breaches that have occurred, which you may not have heard about. Many companies rely on their attorneys to help them make the decision on whether or not to report a breach.
By Lee Kim – In healthcare, the number and volume of the breaches are ever increasing. For many of these breaches, phishing is the initial point of compromise. The human tends to be the weakest link and so hackers tend to exploit the low hanging fruit. Much of the information which is exfiltrated ends up on the black market (e.g., medical identity information, intellectual property, financial information, etc.).