#IBMWoW cognitive solutions for cyber threat analysis and collaboration

I’ll be attending IBM’s World of Watson 2016 in Las Vegas next week. I’m looking forward to hearing whether government and industry are collaborating any better as a result of the passage of The Cybersecurity Act of 2015. The Cyber Act by itself doesn’t really imply (or require) that citizen data (or any other kind of private data) be made accessible across institutions. However, what it does encourage is the sharing of threat or breach data. ...

Evaluating and choosing healthcare cloud services providers

As healthcare moves from on-premise to cloud services, the evaluation and selection of “HIPAA compliant” cloud service providers becomes an import task. I don’t like the description “HIPAA compliant” because it’s imprecise and not meaningful. However, it’s something that many non-technical people look for when evaluating providers so I’m using it here. My friend Alex Ginzburg, VP of Technology at Intervention Insights, and I have done this kind of healthcare cloud services providers evaluation and selection many times so it was natural for me to reach out and ask him to provide some guidance for the community. ...

7 digital health innovations and investments for 2015

The folks from HP Matter digital magazine wanted to know where I thought digital health startups, product innovators, and venture capital investors should be pointing their attention in 2015. These are some of my technology and healthcare predictions: CMS’s request for information (RFI) on new primary care models bears innovative fruit. Interoperability will move beyond talk and into sustainable business models and real technology. The healthcare ecosystem should be able to create lasting patient benefits. ...

Who should be held accountable for risk management and cybersecurity in healthcare institutions?

_I’ve been involved in building many life-critical and mission-critical products over the last 25 years and have found that, finally, cybersecurity is getting the kind of attention it deserves. We’re slowly and steadily moving from “HIPAA Compliance” silliness into a more mature and disciplined professional focus on risk management, continuous risk monitoring, and actual security tasks concentrating on real technical vulnerabilities and proper training of users (instead of just “security theater”). ...