healthsystemcio.com

healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  • About
    • Our Community
    • Social Media
    • Contact Us
    • Privacy & Data Protection Policy
    • healthsystemCIO Policies
    • Terms of Service
  • Advertise
  • Podcasts
  • Subscribe
  • Webinars
    • 11/18-Optimizing Mid-RCM
    • 11/20-Cyber Strategies for AI
    • 12/10-Improving Cyber with Accurate Asset Data
    • On-Demand Webinars

  • About
    • Our Community
    • Social Media
    • Contact Us
    • Privacy & Data Protection Policy
    • healthsystemCIO Policies
    • Terms of Service
  • Advertise
  • Podcasts
  • Subscribe
  • Webinars
    • 11/18-Optimizing Mid-RCM
    • 11/20-Cyber Strategies for AI
    • 12/10-Improving Cyber with Accurate Asset Data
    • On-Demand Webinars
Preventing and detecting insider threats is tricky business, as they arise from within the castle. That’s why a high quality program requires a comprehensive and multi-faceted approach, encompassing employee education, risk assessments and monitoring technologies. But what exactly does such a program look like? Where should limited resources be allocated, and how can IT professionals determine a general order of priorities if many elements need attention? In this timely webinar, we’ll hear from leaders sharing actionable insights to ensure threats from within get as much attention as threats from without.

Keys to Implementing a Comprehensive Insider Threat Mitigation Program

Webinar Archive from 3/25/25
Watch or Listen Below

Listen here using the player below or subscribe through your favorite Podcasting Service

https://media.blubrry.com/healthsystemcio/content.blubrry.com/healthsystemcio/insider-threats-bluesight-webinar-AUDIO-AU.mp3

 

Preventing and detecting insider threats is tricky business, as they arise from within the castle. That’s why a high quality program requires a comprehensive and multi-faceted approach, encompassing employee education, risk assessments and monitoring technologies. But what exactly does such a program look like? Where should limited resources be allocated, and how can IT professionals determine a general order of priorities if many elements need attention? In this timely webinar, we’ll hear from leaders sharing actionable insights to ensure threats from within get as much attention as threats from without.

Key Takeaways:

  • Understand the key fundamentals of insider threats, including their common sources and types in modern digital environments.
  • Learn practical strategies for detecting, assessing, and prioritizing insider threats within an organization’s network.
  • Explore technologies and best practices for building and implementing a comprehensive insider threat mitigation program.

Sponsored By

xContinuing Education Credits: Attendees who hold the following CHIME certifications earn 1 CEU: CHCIO, CHISL, CFCHE, and CDH (all levels). Other programs — such as those offered by AHIMA and NAHQ/HQCC — may also award CEUs. Check with your provider.
a
On-Demand Webinar Library
Subscribe to Learn of Future Events
Advertising & Marketing Services
Share

Annual Sponsors

 

 

Partner Sponsors

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Webinar Exploring IT’s Role in Strengthening Organizational Resiliency By Identifying & Closing Clinical and Business Preparedness Gaps

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2025 HealthsystemCIO.com.