Code Red: HIMSS' Cybersecurity Podcast

Code Red: HIMSS' Cybersecurity Podcast

Welcome to HIMSS’s new health IT cybersecurity podcast, Code Red. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective.

Episodes

January 29, 2019 17 mins
Artificial intelligence (or AI) is a hot topic again and we wanted to have a conversation about its use in healthcare, and what are some of the ethical implications of that. If we’re going to use AI for decision support, whether for clinical or security applications, there are questions we need to ask. And we should probably ask those questions before we get too far down the road to AI nirvana. Our guest today is Mike Lyons, Direct...
Mark as Played
Commitment is critical to a successful security program, and that commitment isn’t just to the technology and processes. The human component is especially important, whether you want your customers to have confidence in your organization’s ability to protect their data, or whether you need to persuade the C-Suite that the benefits of a solid security plan outweigh the costs. Is there a relationship between security and the patient ...
Mark as Played
The HIMSS Cybersecurity Call to Action includes an appeal to use a cybersecurity framework across the sector. There are several out there to choose from and, as we state in our call, HIMSS recommends the NIST Cybersecurity Framework. In our latest cybersecurity survey, we asked respondents whether or not they used a framework, and if so, which one they used. While we learned that the majority of respondents that do use a framework ...
Mark as Played
In the fight to keep health data safe, every node on your network is a potential battlefield.   The fight is easy to notice on the laptops, desktops, smart phones and tablets every time you get a notification a new update or patch has been sent out.  But how easy is it to notice in the next theater of combat, the war to secure connected medical devices? Welcome to Code Red, HIMSS’ cybersecurity podcast.  On this episode, we speak w...
Mark as Played
If you are trying to figure out if you want to start or advance your career in cybersecurity, this podcast is for you.  Perhaps you are trying to figure out how to build a qualified security staff to protect your information.This podcast is for you.  Welcome to Code Red, the HIMSS security podcast.  In this episode, we speak with Rodney Peterson, Director of National Initiative for Cybersecurity Education at the US Department of Co...
Mark as Played
Cybersecurity can be a complex topic, and that complexity seems to increase with each new vulnerability or threat identified.  How do you keep track of everything you’re supposed to do in order to protect your data, your organization, your patients?  Where do you start?  There are tools to help keep track and stay organized, and in this episode of Code Red, we’re going to talk about just one of those tools, the NIST Cybersecurity f...
Mark as Played
What are the security threats your organization perceives to be most urgent to mitigate? Do you have the capabilities to implement those controls? Sometimes you need to go outside and bring in a third party to help. But what do you look for when searching for a vendor? How do you build a true partnership? Finally, is there still room for innovation in the security realm? That’s a lot of questions, and we’ve got the answers! On this...
Mark as Played
Imagine you work at a hospital and you are responsible for the health and wellbeing of thousands of patients a year. That’s not such a stretch. Many of us listening to this podcast are in this situation. You are in charge of the information systems at the hospital and all the data is your responsibility, whether clinical or operational. And you’re responsible for maintaining the privacy and security of that data. Let’s add a little...
Mark as Played
There’s a shortage of people qualified to work in cybersecurity, and we need to do something about that. But what is that “something?” Let’s be honest here, we’re not going to change that situation overnight. It takes years to acquire the kind of skills needed to pursue the education, experience and credentials required. But what can we do in the meantime? We’ve said it before on Code Red: we’re all involved in security, to one deg...
Mark as Played
When it comes to cybersecurity, the enemy holds many advantages.  They run the timetable.  They establish the rules of engagement.  And in a culture that exults the bandit, the pirate, and the hacker, they find many fellow travelers in dark places, on the web and in the world.   But for every bandit there is a sheriff.  This age is no different.  Rather than wearing badges and walking dusty wooden sidewalks, today’s cybersecurity s...
Mark as Played
This Episode’s GuestGreg WolvertonChief Information OfficerARcareLearn more about GregFollow Greg on Twitter: @GregWolvertonLearn more about ARcareUniversity of Houston professor Brené Brown understands the strength that comes from embracing our vulnerabilities. “When we spend our lives”, Brown says, “waiting until we’re perfect or bulletproof before we walk into the arena, we ultimately sacrifice relationships and opportunities th...
Mark as Played
Let’s accept the fact that we want to feel secure in some way, whether it is secure in our jobs, our relationships, or our personal safety and wellbeing.  We want the best for our families, our business endeavors or, as in healthcare, for the other people for whom we have some degree of responsibility.  But how do you place a value on the effort we make to create a secure environment?   In this episode of Code Red, we talk with Fre...
Mark as Played
It’s amazing what a difference a moment can make.  By the time you’re done listening to this introduction, 160 new malware samples will be released.  By the time you’re done listening to this introduction, someone will have become the first victim of a spam-based malware attack. By the time you’re done listening to this episode, ten thousand Facebook accounts will be compromised.  27 thousand computers worldwide will be added to a ...
Mark as Played
On March 12, 2008, the New York Times reported about a team of computer security researchers from Beth Israel Deaconess Medical Center and the Universities of Washington and Massachusetts that able to gain wireless access and reprogram a combination heart defibrillator and pacemaker to deliver potentially fatal jolts of electricity to a person with the device.   Since that zero day nine years ago, the health care industry has moved...
Mark as Played
September 13, 2016 23 mins
Need to know the dosage for a patient’s medication?  Tough, pay me.  Need to know the lab results for that biopsy?  Tough, pay me.  Need to access your notes to reconsider a patient’s prognosis?  Tough, pay me.Well, this is a new problem, isn’t it? Paper records on a shelf?  Pretty hard to walk off with those.  You can keep an eye on those.  You can lock a door on those.  Electronic records on your database?  Take a number.  Who is...
Mark as Played
Welcome to Code Red, HIMSS’s new health IT cybersecurity podcast. Code Red focuses on cybersecurity challenges facing health care today & tomorrow, featuring the voices of the people on the front lines. The goal of the podcast is to explore the interplay between the people, processes & technologies that make up an organization’s cybersecurity posture from both a leadership & skills-based perspective. In this August update episode, ...
Mark as Played
So here’s what keeps me up at night:   The neighbor’s barking dog. The stray firecracker that goes off at 2:30. And Patients.  Millions of patients.  And when I say patients, I really mean people.  Millions of people whose most intimate details… their stories…have been laid bare for the world to see on behalf of the highest bidder.  Millions of people who have to wonder who knows about their recent bout of depression.  Or who knows...
Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    24/7 News: The Latest

    The latest news in 4 minutes updated every hour, every day.

    Therapy Gecko

    An unlicensed lizard psychologist travels the universe talking to strangers about absolutely nothing. TO CALL THE GECKO: follow me on https://www.twitch.tv/lyleforever to get a notification for when I am taking calls. I am usually live Mondays, Wednesdays, and Fridays but lately a lot of other times too. I am a gecko.

    The Clay Travis and Buck Sexton Show

    The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.

    The Bobby Bones Show

    Listen to 'The Bobby Bones Show' by downloading the daily full replay.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.