Modal body text goes here.
JavaScript seems to be disabled in your browser.
You must have JavaScript enabled in your browser to utilize the functionality of this website.Click here for instructions on enabling javascript in your browser.
Learn how the structure of a healthy and reliable cybersecurity program looks very similar to a healthy and reliable clinical program.
Population Health is generally defined as having three components: health outcomes, patterns of health determinants, and policies and interventions. Cybersecurity is no different and serves as the Quality and Medical Records part of IT. In fact the structure of a healthy and reliable cybersecurity program looks very similar to a healthy and reliable clinical program. We encourage you to join us as we look at the building blocks for what makes a high performance and reliable cybersecurity program. During this session we will look at how to integrate cybersecurity into the broader risk management program along with the role Clinical and Operational Leadership have for cybersecurity. A good cybersecurity program is very similar to a good population health program; the context and interventions are just different.
This program meets continuing education requirements for Administrators and Alternates under Texas HCSSA licensing regulations.
Wayne Pierce, Cybersecurity Program Advisor, CyberForce | Q
Wayne is an established cybersecurity consultant with over 26 years of experience in cybersecurity, skilled in information security program implementation, quantifiable measurement, and strategic advancement. He helps implement quantifiable information security programs with guaranteed improvement as well as successfully guides organizations through the alignment of security controls and regulatory requirements. Examples include CIS CSC 18, NIST CSF, ISO 27001, PCI-DSS, CMMC, and HIPAA. Wayne has helped organizations develop policies, procedures, reporting capabilities, and metrics to support program requirements. He collaborates with client leadership to develop reasonable and effective security strategies leading to the implementation of security technology integrations for real-time-audit of security controls. His professional certifications include Certified Information Security Manager (CISM) and Certified Chief Information Security Officer (CCISO).