Loading
Answer this question, get featured on TrustNet
What sessions/trends are you watching out for in this year's biggest cybersecurity event, RSA Conference (#RSAC)?
Deadline: Mar 27th, 2025 03:00 PM
This deadline has passed
, and new answer submissions are no longer being accepted.
Publisher:
T
TrustNet
This deadline has passed
New answer submissions are no longer being accepted for this question.
View Similar Opportunities
H
HCPRO
Questions for HIM leaders on Trump’s 2026 Cyber Strategy. Healthcare as critical infrastructure: 1. From an HIM perspective, what are the most vulnerable points in hospital information environments today—EHR systems, imaging archives, patient portals, or something else? 2. What practical steps should HIM leaders take now to reduce cyber risk to patient data as hospitals increasingly become targets for ransomware and data theft? Zero trust and modernizing health information systems: 1. What does zero trust look like inside a hospital’s HIM environment? 2. What challenges do HIM teams face when trying to secure historical medical records stored in outdated systems? AI-driven cybersecurity and data protection: 1. How might AI change the way HIM departments monitor and protect patient data access? 2. What risks should HIM leaders consider when healthcare organizations deploy AI systems that interact with protected health information? Regulatory alignment and compliance pressures: 1. Are healthcare organizations currently overwhelmed by cybersecurity compliance requirements? Supply chain and vendor risks: 1. How exposed are hospitals to cybersecurity risks through third-party vendors, EHR partners, and health IT suppliers? Workforce and cyber talent in healthcare: 1. Where are the biggest cybersecurity skill gaps related to health information management? Patient safety and data availability: 1. From an HIM perspective, how do cyber incidents threaten patient safety, not just data privacy?
C
CSO Online
Technology journalist is seeking experts who can answer the following: 1. What is the most important “cyber risk assessment gotcha” a CISO should try to avoid? 2. What makes this gotcha particularly problematic? 3. What is the best way to avoid getting caught by a cyber risk assessment gotcha? 4. What is the best way to recover if it happens? 5. Anything else you would like to add?
B
Blue Code Security Solutions
What cyber security courses are available for beginners and professionals?