Vertical Industries  >  

Home Healthcare Industry

RSS Feed    Add to Google    Add to My Yahoo!
Home Healthcare Industry Reports
 
Informing FDA Regulatory Policy for Cybersecurity Through Software Testing
sponsored by Synopsys
WHITE PAPER: Access this white paper to learn how the FDA generates data that can be used to determine cybersecurity risks associated with medical devices and healthcare systems, and apply the knowledge towards regulatory requirements.
Posted: 12 Sep 2016 | Published: 01 Aug 2016


What Does the Future Hold for Medical Image Management?
sponsored by Ambra
VIDEO: What does the future hold for medical image management? Tune into this webinar to hear from the industry's physician thought-leaders regarding the current state of medical imaging, how digital innovations like cloud boost collaboration, and what the future holds for PACS and EHR.
Posted: 26 Oct 2016 | Premiered: 26 Oct 2016

Ambra

Managing Cybersecurity Risk in a HIPAA-Compliant World: HIPAA and HITRUST
sponsored by Coalfire
WHITE PAPER: Should you assess your compliance and risk management posture against HIPAA, or HITRUST? Discover the answers to health IT security professionals' frequently asked questions on the two frameworks to help you identify the best approach to developing a solid security risk and management program for your organization.
Posted: 02 Jun 2016 | Published: 01 May 2016

Coalfire

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

How to Enhance Staff Safety with Location Awareness
sponsored by Ekahau, Inc.
VIDEO: This webinar examines how you can use location awareness alerts and messaging to enhance staff safety and thus, patient satisfaction, with wireless technology within a healthcare organization.
Posted: 27 Jan 2016 | Premiered: 05 Dec 2014

Ekahau, Inc.

Healthcare Business Intelligence: 5 Steps to Ensure Organizational Support
sponsored by Dimensional Insight, Inc.
EGUIDE: Many BI programs fail due to a lack of user adoption. To make your healthcare BI initiative successful, you need to educate employees on the value they can expect to see by setting performance goals. This e-guide provides a 5-step process to ensure a strong adoption rate.
Posted: 28 Jan 2016 | Published: 27 Jan 2016


HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Benefits of Analytics Tools for Patient Care, Medical Billing, and Claims Data
sponsored by Dimensional Insight, Inc.
EGUIDE: This educational e-guide discusses some of the benefits that investing in analytics can bring to healthcare organizations. Learn how analytics has improved insurance claim examination and helped detect fraud, identified high-risk patients, charted performance evaluations of treatment plans, and more.
Posted: 28 Jan 2016 | Published: 27 Jan 2016


Former Healthcare CIO Talks Cybersecurity in Healthcare
sponsored by Optum
EGUIDE: Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement