- Home
- Security
- Breach. Theft. Disaster: Protecting the Digital Transformation from Itself in Healthcare
Breach. Theft. Disaster: Protecting the Digital Transformation from Itself in Healthcare
Breach. Theft. Disaster: Protecting the Digital Transformation from Itself in Healthcare
What you'll learn
The defenses against a cyberattack will continue to be tested and the inevitable will happen. It’s not if, but when a data breach or theft occurs. Encryption provides that last line of defense and protects the data in whatever environment a new technology is deployed.
- Security should not be an afterthought. Systems should be designed with security in mind
- Security is never one solution but encryption is the core of security
- Legacy security solutions cannot and should not be used in new technology environments
Maksim Yankovskiy
VP Engineering
Zettaset
Bio info: Maksim has over 20 years of experience delivering and managing enterprise encryption and database software across...
Maksim has over 20 years of experience delivering and managing enterprise encryption and database software across all the major high tech industries. During his tenure at Zettaset, he has been responsible for the engineering team that delivered the entire XCrypt product portfolio. He has also filed patents related to distributed and high-performance encryption.
Tim Reilly
CEO
Zettaset
Bio info: Tim brings more than 25 years of successful public and private experience in the high-tech industry filling key...
Tim brings more than 25 years of successful public and private experience in the high-tech industry filling key operational roles within product line business units and venture capital funded companies through all stages of growth. During his time at Zettaset, the company has successfully grown its software-defined encryption portfolio to provide a comprehensive data protection solution across all physical, virtual and cloud environments.
Details
Event Type : On Demand
Date : Jul 27, 2020 11:00 AM CT
Cost : Complimentary
Credits : CPHIMS, CAHIMS
Speaker(s) : Maksim Yankovskiy, Tim Reilly
RegisterInvite a friend
Related content
-
Let’s Talk Insider Threats
An insider leaking patient records at a doctor’s office...
Learn moreCost
$0.00 Non-member
$0.00 Member
Nov 17, 2020
-
Securing Telemedicine in a Post-COVID World
Telemedicine is here to stay, even in a post-COVID world....
Learn moreCost
$0.00 Non-member
$0.00 Member
Oct 13, 2020
-
Cyber Protection for Healthcare Data: Beyond the Pandemic
Healthcare leaders talked about digital transformation for...
Learn moreCost
$0.00 Non-member
$0.00 Member
Oct 07, 2020
-
The Interoperability Rule - an Open Opportunity
How can healthcare providers and payers turn a compliance...
Learn moreCost
$0.00 Non-member
$0.00 Member
Sep 29, 2020
-
Establishing Security for Cloud Healthcare Solutions
The security of PHI and other critical data is a key...
Learn moreCost
$0.00 Non-member
$0.00 Member
Sep 25, 2020
-