Risk Management Strategy / en Wed, 30 Apr 2025 06:05:52 -0500 Mon, 28 Apr 25 10:30:00 -0500 Leadership Dialogue /leadership-dialogue &lt;div class="container"&gt;&lt;div class="row"&gt;&lt;div class="col-md-8"&gt;&lt;img src="/sites/default/files/inline-images/leadership-dialogue-freese-decker-riggi-900x400.jpg" data-entity-uuid="40fb79e5-2979-4656-8fc4-eff5ace41045" data-entity-type="file" alt="Leadership Dialogue. A conversation with AHA Chair Tina Freese Decker and John Riggi, AHA National Advisory for Cybersecurity and Risk." width="900" height="400"&gt;&lt;p&gt;In this episode, Tina Freese Decker, 2025 chair of the AHA Board of Trustees, talks with John Riggi, AHA’s National Advisor for Cybersecurity and Risk. Riggi spent nearly 30 years with the FBI before joining the AHA in 2018.&lt;/p&gt;&lt;p&gt;Freese Decker and Riggi discuss cybersecurity and physical threats, which are significant enterprise risks for health care, regardless of size or location. Every hospital, physician group and medical center is at risk — and this risk puts the people served at risk, which is why organizations must take these threats seriously.&lt;/p&gt;&lt;p&gt;Riggi shared three major themes the health care field must lean into regarding cyber and physical threats. The first is leadership. Leaders and teams must recognize that cyber and physical threats are an enterprise risk issue and put the necessary resources in place to be proactive and prevent these threats from occurring. Second, third parties pose a major risk. It is important to evaluate third-party risk and put plans in place to minimize the risk as much as possible. Third, prepare, prepare, prepare! Part of preparation is educating leaders and staff and creating partnerships within the organization and in the community to be able to respond and act if and when something happens.&lt;/p&gt;&lt;hr&gt;&lt;p&gt;&lt;/p&gt;&lt;hr&gt;&lt;div&gt;&lt;/div&gt;&lt;div class="raw-html-embed"&gt; &lt;details class="transcript"&gt; &lt;summary&gt; &lt;h2 title="Click here to open/close the transcript."&gt; &lt;span&gt;View Transcript&lt;/span&gt;&lt;br&gt; &lt;/h2&gt; &lt;/summary&gt; &lt;p&gt; 00:00:01:01 - 00:00:26:02&lt;br&gt; Tom Haederle&lt;br&gt; Welcome to Advancing Health. Cybersecurity is a risk. And because of that, a priority for all hospitals and health systems. In this Leadership Dialogue, Tina Freese Decker, chair of the Association, and John Riggi, AHA’s national advisor for Cybersecurity and Risk, discuss planning for cyber attacks, putting protections in place, navigating cyber threats, and rebuilding trust and confidence in the system &lt;/p&gt; &lt;p&gt; 00:00:26:04 - 00:00:31:01&lt;br&gt; Tom Haederle&lt;br&gt; when cyber attacks do occur. &lt;/p&gt; &lt;p&gt; 00:00:31:04 - 00:01:00:23&lt;br&gt; Tina Freese Decker&lt;br&gt; Hello, and thank you so much for joining us today. I'm Tina Freese Decker, president CEO of Corewell Health and the board chair for the Association. From data breaches to ransomware attacks to outages, cybersecurity affects patient safety and enterprise risk and is increasingly a strategic priority for hospitals and health systems. Planning for cyber attacks and putting the proper protections in place is key to ensuring sustainability, patient privacy and clinical outcomes. &lt;/p&gt; &lt;p&gt; 00:01:00:26 - 00:01:34:22&lt;br&gt; Tina Freese Decker&lt;br&gt; So I am so pleased to have the Association's John Riggi joining me for today's conversation. John is an expert in this field, and he serves as the AHA's first national advisor for cybersecurity and risk. He joined AHA in 2018 after a long, distinguished 30-year career with the FBI. He brings with him tremendous experience in the investigation and disruption of cyber threats, as well as the unique ability to provide informed risk advisory services to hospitals and health systems. &lt;/p&gt; &lt;p&gt; 00:01:34:24 - 00:01:41:26&lt;br&gt; Tina Freese Decker&lt;br&gt; So before we jump into the conversation, John, can you just tell me a bit about yourself so that our audience can get to know you a little bit better? &lt;/p&gt; &lt;p&gt; 00:01:41:29 - 00:02:08:13&lt;br&gt; John Riggi&lt;br&gt; Thank you, Tina, so much for inviting me here today to discuss these topics, which unfortunately, as you said, top of mind for everyone. So when I ended my 30-year career at the FBI, I still wanted to be in a position to serve. I spent a lifetime doing that, and in my last role at the FBI, my job was to establish mission critical relationships with private sector, with critical infrastructure in the health care sector in particular. &lt;/p&gt; &lt;p&gt; 00:02:08:15 - 00:02:29:22&lt;br&gt; John Riggi&lt;br&gt; That's when I had the privilege and honor to be introduced to AHA and Rick Pollack in talking about cyber threats. And that's when I really learned how critical a role that the Association served for the entire health care sector. I could send over, you know, an immediate urgent alert to the and with a single press of a button &lt;/p&gt; &lt;p&gt; 00:02:29:29 - 00:02:56:16&lt;br&gt; John Riggi&lt;br&gt; 5000 plus hospitals received that alert. 50,000 executives received it. So I understood at that point we needed to engage in that continuing relationship. And when I retired, fortunately for me, Rick Pollack in the team said, John, you know, we've been listening to you and we think cyber will be an emerging threat, going forward. Unfortunately, none of us realized how significant a threat it would be. &lt;/p&gt; &lt;p&gt; 00:02:56:19 - 00:03:00:12&lt;br&gt; John Riggi&lt;br&gt; And so, again, my privilege and honor to be here with you today. &lt;/p&gt; &lt;p&gt; 00:03:00:14 - 00:03:22:21&lt;br&gt; Tina Freese Decker&lt;br&gt; Well, we are privileged and blessed that you are part of the Association team, and you're helping us navigate so many of these issues that come forward. Let's start with kind of one of the underlying questions that I have. We've seen all these cyber and physical threats that have targeted hospitals and health systems. How have they evolved over the last, let's say, 7 to 8 years? &lt;/p&gt; &lt;p&gt; 00:03:22:24 - 00:03:58:21&lt;br&gt; John Riggi&lt;br&gt; Yeah, unfortunately they've increased pretty dramatically. So not only are they increased in frequency, but also in complexity and severity of impact. So on the cyber front, we have seen a, for instance, in hacking of patient health information. In 2020, it was about 450 hacks impacting 27 million individuals, not inconsequential. Last year, last year with the Change Healthcare attack, we had 259 million Americans had their health care records stolen or compromised by foreign bad guys, by foreign bad guys. &lt;/p&gt; &lt;p&gt; 00:03:58:27 - 00:04:24:17&lt;br&gt; John Riggi&lt;br&gt; If we add up the numbers, just since 2020, over 500 million Americans have had their health care records compromised or stolen. So, John, wait a minute. There's only 330 million Americans. That's the population. Meaning that every American in this country has had their health care records compromised more than once. But what really concerns us are the dramatic increase in ransomware attacks, which are often accompanied by data theft attacks. &lt;/p&gt; &lt;p&gt; 00:04:24:19 - 00:04:51:12&lt;br&gt; John Riggi&lt;br&gt; So these bad guys, primarily Russian speaking, believed to be provided safe harbor by the Russian government primarily but not exclusively Russian, have increased these attacks so that the impact really is not only disablement of technology, internal networks get shut down, data gets encrypted, organizations are forced to disconnect from the internet has a very, very dramatic impact on care delivery. &lt;/p&gt; &lt;p&gt; 00:04:51:15 - 00:05:18:21&lt;br&gt; John Riggi&lt;br&gt; So this resulting disruption, delay to care delivery and ultimately posing a serious risk to patient care and safety, not only for the patients in the hospital, but for the entire communities that depend on the availability of their nearest emergency department for life saving care, radiation oncology, so forth. So we've seen that evolve again very significantly, and one of the reasons I think it's evolved so dramatically. &lt;/p&gt; &lt;p&gt; 00:05:18:23 - 00:05:30:21&lt;br&gt; John Riggi&lt;br&gt; Geopolitics is part of that. But I think on a very base level, we as a sector depend more and more on network and internet connected technology and data. &lt;/p&gt; &lt;p&gt; 00:05:30:24 - 00:05:56:13&lt;br&gt; Tina Freese Decker&lt;br&gt; Very true. You know, I did a podcast earlier this year about trust and rebuilding confidence and trust and having that public trust in health care systems and hospitals. And when you have a cyber attack or an act of violence that targets hospitals, health systems, it impacts patients, like you said, it impacts staff and our communities. How can we go about building that trust and regaining that confidence when we have these instances occur? &lt;/p&gt; &lt;p&gt; 00:05:56:15 - 00:06:06:23&lt;br&gt; Tina Freese Decker&lt;br&gt; And do you have some examples of stories or insights organizations have used that have helped them navigate those cyber threats and build that public trust? &lt;/p&gt; &lt;p&gt; 00:06:06:26 - 00:06:32:07&lt;br&gt; John Riggi&lt;br&gt; Great question, Tina. And also on the on the violence side, unfortunately, as I wanted to mention as well, that's increased pretty dramatically to set the stage there. I was shocked, as a former law enforcement officer, to find out nurses are the second most assaulted profession outside of law enforcement. And, you know, we expect it as law enforcement officers to be engaged, confrontational engagements. &lt;/p&gt; &lt;p&gt; 00:06:32:07 - 00:06:37:09&lt;br&gt; John Riggi&lt;br&gt; You're making arrests, but nurses who just want to deliver care to help people? Shocking. &lt;/p&gt; &lt;p&gt; 00:06:37:09 - 00:06:38:19&lt;br&gt; Tina Freese Decker&lt;br&gt; It's sad and unacceptable. &lt;/p&gt; &lt;p&gt; 00:06:38:23 - 00:06:58:27&lt;br&gt; John Riggi&lt;br&gt; Agree, totally. So I think how do we how do we get that trust in the community? I think one - and I think we've done a fantastic job with your leadership and the AHA - acknowledge the risk, acknowledge the threat. Let's not hide it. Let's not pretend it's not there. But then to take real steps to prepare and help mitigate the impact of these threats. &lt;/p&gt; &lt;p&gt; 00:06:59:00 - 00:07:25:01&lt;br&gt; John Riggi&lt;br&gt; So now we see, on the cyber side, hospitals are actively working to develop better downtime procedures, better backup systems to help shorten the length of the impact and help recover more quickly. And work with the federal government. Exchange threat information across the sector with our partners in other sectors. And really understand if we're attacked, this isn't a stigma. &lt;/p&gt; &lt;p&gt; 00:07:25:02 - 00:07:51:18&lt;br&gt; John Riggi&lt;br&gt; This isn't something that an organization failed to do. We're all in this together. And on the physical side, we're working very closely with the FBI to help develop resources to help identify and mitigate targeted acts of violence directed toward health care organizations. But most importantly, our frontline health care heroes, our frontline health care workers. And again, working with the community, this is all partnership with the community as well. &lt;/p&gt; &lt;p&gt; 00:07:51:20 - 00:08:08:05&lt;br&gt; Tina Freese Decker&lt;br&gt; So I'm sure you have a top ten list of things that we could do to prevent these attacks. But if you could share the top three things that we should do to prevent these attacks and how we can be resilient. And when I say attacks, I'm talking cyber and physical. We have limited time, we have limited resources. &lt;/p&gt; &lt;p&gt; 00:08:08:05 - 00:08:10:19&lt;br&gt; Tina Freese Decker&lt;br&gt; But what is the most important things that we should be doing? &lt;/p&gt; &lt;p&gt; 00:08:10:22 - 00:08:36:21&lt;br&gt; John Riggi&lt;br&gt; I think the overarching umbrella that all the others follow under is leadership. And really looking at these risks, acknowledging them and ensuring that both cyber and physical risks are treated as an enterprise risk issue. And then within that, on the cyber side, making sure on the defensive side that you're following well known, well-established, recognized cyber frameworks, making sure you start there. &lt;/p&gt; &lt;p&gt; 00:08:36:24 - 00:09:03:08&lt;br&gt; John Riggi&lt;br&gt; Second, really thinking about third party risk. What we have seen is that a majority, the vast majority of cyber risk, cyber attacks we face come to us through insecure third party service providers. Insecure third party technology and insecure supply chain. Doesn't negate us from our responsibility to do what we can, but we have to understand that. And then the third thing is ultimately prepare. &lt;/p&gt; &lt;p&gt; 00:09:03:10 - 00:09:24:08&lt;br&gt; John Riggi&lt;br&gt; We must prepare for the attack. There's an often, I would say, overused expression in the cyber security world. It's not a matter of if, but when. It's true. But I would also change that a little bit about it's not a matter of if you will be attacked. The question is are you prepared? So focusing on resiliency and so forth. &lt;/p&gt; &lt;p&gt; 00:09:24:10 - 00:09:55:13&lt;br&gt; John Riggi&lt;br&gt; And then with on the physical side, education of staff, leadership priority, and working with the FBI and local law enforcement to potentially identify ahead of an incident acts of targeted violence directed towards the hospital. And then working together as a community help mitigate and prevent that act. The police always want to respond, can respond after the FBI. But I can tell you from personal experience, we'd rather prevent a crime, prevent an act of violence than respond after the fact. &lt;/p&gt; &lt;p&gt; 00:09:55:15 - 00:10:19:15&lt;br&gt; Tina Freese Decker&lt;br&gt; Agree. And I think that developing those relationships with local FBI, with local law enforcement is critical because you to your point, it's not if, but when. But we'd like to be able to prevent all of it. Having those relationships is key. So I know that the AHA has been working very closely with the FBI and some health care systems to exchange that threat intelligence and enhance collaboration across our sector &lt;/p&gt; &lt;p&gt; 00:10:19:15 - 00:10:28:21&lt;br&gt; Tina Freese Decker&lt;br&gt; and with federal agencies. Can you share more about that partnership and how it has helped us in identifying and mitigating both physical and cyber threats? &lt;/p&gt; &lt;p&gt; 00:10:28:24 - 00:10:51:26&lt;br&gt; John Riggi&lt;br&gt; Great question again, Tina, and thank you for highlighting what we're doing with the FBI. So on the cyber front, we've been actively engaged in cyber threat, information threat intelligence exchange. Both on a very technical level, exchanging what - without getting too technical - threat indicators, malware signatures and so forth, but also identifying big strategic threats that we may face as a sector. &lt;/p&gt; &lt;p&gt; 00:10:51:28 - 00:11:19:23&lt;br&gt; John Riggi&lt;br&gt; So, for instance, working with the FBI, we helped identify last year a threat to the blood supply before it was on the government's radar. We helped the government understand that cyber attacks on hospitals are not just data theft crimes. These are truly threat to life crimes. So the federal government actually previously raised the investigative priority level of ransomware attacks on hospitals to equal that of a terrorist attack once they understood what the impact was. &lt;/p&gt; &lt;p&gt; 00:11:19:24 - 00:12:00:17&lt;br&gt; John Riggi&lt;br&gt; We are working very closely with the famed Behavioral Analysis Unit of the FBI, the profilers that many books and TV shows and movies have been written about to develop resources to help hospitals identify targeted acts of violence, threats that are pending against hospitals, and again, help intercede, intervene and help prevent those attacks. We have a whole series of resources available on the first ever joint FBI and Joint Health Care Sector webpage. We're about to issue a manual coming out here within the next month or so, based upon, joint work with the FBI in the field on best practices and lessons learned to prevent these acts of violence. &lt;/p&gt; &lt;p&gt; 00:12:00:17 - 00:12:06:08&lt;br&gt; John Riggi&lt;br&gt; So we have a robust, almost daily interaction with the FBI and other federal agencies. &lt;/p&gt; &lt;p&gt; 00:12:06:10 - 00:12:25:15&lt;br&gt; Tina Freese Decker&lt;br&gt; It's so helpful to know that we have those robust partnerships at the national level, and then we can create it at the local level, and to make sure that we're all in this together to, help protect our patients and the people that we care for in our community. So that's wonderful. My last question for you is just one about how we look forward. &lt;/p&gt; &lt;p&gt; 00:12:25:17 - 00:12:38:26&lt;br&gt; Tina Freese Decker&lt;br&gt; Can you tell us what you think about is going to happen in the threat environment for 2025 and maybe into 2026? What are those things we should be watching, looking out for? And is there anything positive that you can see? &lt;/p&gt; &lt;p&gt; 00:12:38:29 - 00:13:11:18&lt;br&gt; John Riggi&lt;br&gt; I will let you know there is some hope. Talk about the realistic environment. Then we'll talk about where I see the hope. So first of all, I do believe that the frequency of the attacks may decrease, but I think the bad guys are looking to make a greater impact. We have seen them go after systemically important organizations that serves health care. Change Healthcare, for example. Last year, attacks against the blood supply. The year before they attacked - found vulnerabilities in a commonly used technology and software known as Move It. &lt;/p&gt; &lt;p&gt; 00:13:11:21 - 00:13:41:03&lt;br&gt; John Riggi&lt;br&gt; By attacking that software, it gave the bad guys, a Russian ransomware group, were able to gain access to millions and millions of patient records. I do believe geopolitics will have a very significant influence, for better or worse, on the level of cyber threat we face. Depending on how we deal in the outcomes of our negotiations, of our diplomatic efforts with Russia, China, North Korea and Iran has the potential to mitigate or increase the cyber threats that we face. &lt;/p&gt; &lt;p&gt; 00:13:41:05 - 00:14:08:19&lt;br&gt; John Riggi&lt;br&gt; And ultimately, again, third party risk, major, major issue. Where do I see the signs of hope? And there are signs of hope, folks. Honestly, I have never seen the sector come together to share threat information to prepare for attacks, best practices, lessons learned not only amongst the sector. We see channels of threat information sharing and best practice across with other critical and sectors, with the federal government. &lt;/p&gt; &lt;p&gt; 00:14:08:21 - 00:14:45:26&lt;br&gt; John Riggi&lt;br&gt; We've had victim organizations, CEOs come out publicly. Dr. Leffler from University of Vermont, Chris Van Gorder from Scripps. We've had Eduardo Conrado from the recent attack against Ascension not only come out publicly, but testify before the UN Security Council last November about the impact of this Russian ransomware attack against Ascension. So what I see is hope. The fact we are banding together and with the government and I hope, as we did in the great fight against terror, international terrorism, we will come together in a whole of nation approach to help mitigate that risk. &lt;/p&gt; &lt;p&gt; 00:14:46:01 - 00:15:09:17&lt;br&gt; John Riggi&lt;br&gt; Now, Tina, I know I've done a lot of speaking here, and if I may, and with all due respect, I'd like to ask you a question if I could. Tina, in your role, you have very unique dual role. You're CEO of a large health system, and you're also the chair of the Association board. So how do you think about cyber and physical threats for your own organization &lt;/p&gt; &lt;p&gt; 00:15:09:19 - 00:15:11:20&lt;br&gt; John Riggi&lt;br&gt; but on a national level? &lt;/p&gt; &lt;p&gt; 00:15:11:22 - 00:15:33:26&lt;br&gt; Tina Freese Decker&lt;br&gt; Well, I believe that cyber and physical threats must be prioritized. It's a strategic risk. We have to understand how we focus on it, and we have to significantly prioritize it and emphasize what we're doing there. Previously, maybe 5 or 10 years ago, it was just thought of as a technical issue. It's not that. It's how we operate. Because like you said, we're so connected, &lt;/p&gt; &lt;p&gt; 00:15:33:26 - 00:16:01:07&lt;br&gt; Tina Freese Decker&lt;br&gt; it's critical infrastructure and we must make sure that we are coming together. So for us as an organization, we prioritize our efforts, our investments, our work on it, but also prioritize business assurance. So how do we operate and make sure that everyone understands all the key components and the lessons that you shared on this discussion today, but also when we've had conversations before, how are we making sure that we know those and our teams know those? &lt;/p&gt; &lt;p&gt; 00:16:01:09 - 00:16:25:19&lt;br&gt; Tina Freese Decker&lt;br&gt; I think the importance of safeguarding sensitive patient data and ensuring the integrity of our systems cannot be overstated. And that applies for my organization, and that applies for all of our members throughout the Association. And so I think those are some critical points. As we think about this it is making sure that we are safeguarding sensitive patient data and ensuring the integrity of our systems, as we go forward. &lt;/p&gt; &lt;p&gt; 00:16:25:19 - 00:16:59:14&lt;br&gt; Tina Freese Decker&lt;br&gt; That cannot be overstated. And as we do that, I think we all uphold that level of commitment to excellence that our patients and the people in our community want. So, John, thank you so much for your time today, for sharing your expertise. While we may not be able to prevent or mitigate everything, you have given us such great advice and we should make sure we take that down, but also listen to many of your podcasts that you put out or the Action Alerts that you sent through because they are helpful and direct and provide that great advice to move forward. &lt;/p&gt; &lt;p&gt; 00:16:59:16 - 00:17:17:11&lt;br&gt; Tina Freese Decker&lt;br&gt; And I know that you are available to connect with all of our members if there is a specific situation, or they just want to learn more to make sure that we're better. So thank you, John, for being here. And thank you to all of those that have tuned in to this conversation. We will be back next month for another Leadership Dialogue. &lt;/p&gt; &lt;p&gt; 00:17:17:13 - 00:17:25:24&lt;br&gt; Tom Haederle&lt;br&gt; Thanks for listening to Advancing Health. Please subscribe and rate us five stars on Apple Podcasts, Spotify, or wherever you get your podcasts. &lt;/p&gt; &lt;/details&gt; &lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-4"&gt;&lt;div class="views-element-container"&gt; &lt;section class="top-level-view js-view-dom-id-85adc4daa833e27a1ce4681175da7d7beba8f7027d9262ee8eb633b484cefe64 resource-block"&gt; &lt;h2&gt;Previous Leadership Dialogues and Rounds&lt;/h2&gt; &lt;div class="resource-wrapper"&gt; &lt;div class="resource-view"&gt; &lt;div class="article views-row"&gt; &lt;div class="views-field views-field-title"&gt; &lt;span class="field-content"&gt;&lt;a href="/news/chairpersons-file/2025-03-31-chair-file-leadership-dialogue-importance-advocacy-and-storytelling-rural-health-lori" hreflang="en"&gt;Chair File: Leadership Dialogue — Importance of Advocacy and Storytelling in Rural Health with Lori Wightman, R.N., CEO of Bothwell Regional Health Center&lt;/a&gt;&lt;/span&gt; &lt;/div&gt;&lt;div class="views-field views-field-created"&gt; &lt;span class="field-content"&gt;&lt;time datetime="2025-03-31T10:49:30-05:00"&gt;Mar 31, 2025&lt;/time&gt; &lt;/span&gt; &lt;/div&gt;&lt;/div&gt; &lt;div class="article views-row"&gt; &lt;div class="views-field views-field-title"&gt; &lt;span class="field-content"&gt;&lt;a href="/news/chairpersons-file/2025-02-24-chair-file-leadership-dialogue-advancing-health-and-building-trust-lynn-hanessian-and-robert" hreflang="en"&gt;Chair File: Leadership Dialogue — Advancing Health and Building Trust with Lynn Hanessian and Robert Trestman, M.D.&lt;/a&gt;&lt;/span&gt; &lt;/div&gt;&lt;div class="views-field views-field-created"&gt; &lt;span class="field-content"&gt;&lt;time datetime="2025-02-24T08:21:34-06:00"&gt;Feb 24, 2025&lt;/time&gt; &lt;/span&gt; &lt;/div&gt;&lt;/div&gt; &lt;div class="article views-row"&gt; &lt;div class="views-field views-field-title"&gt; &lt;span class="field-content"&gt;&lt;a href="/news/chairpersons-file/2025-01-27-chair-file-leadership-dialogue-tackling-todays-health-care-challenges-aha-leaders-stacey" hreflang="en"&gt;Chair File: Leadership Dialogue — Tackling Today’s Health Care Challenges with AHA Leaders Stacey Hughes and Ashley Thompson&lt;/a&gt;&lt;/span&gt; &lt;/div&gt;&lt;div class="views-field views-field-created"&gt; &lt;span class="field-content"&gt;&lt;time datetime="2025-01-27T09:40:27-06:00"&gt;Jan 27, 2025&lt;/time&gt; &lt;/span&gt; &lt;/div&gt;&lt;/div&gt; &lt;div class="article views-row"&gt; &lt;div class="views-field views-field-title"&gt; &lt;span class="field-content"&gt;&lt;a href="/news/chairpersons-file/2024-12-16-leadership-dialogue-assessing-health-care-challenges-and-successes-tina-freese-decker" hreflang="en"&gt;Leadership Dialogue — Assessing Health Care Challenges and Successes With Tina Freese Decker, President and CEO of Corewell Health&lt;/a&gt;&lt;/span&gt; &lt;/div&gt;&lt;div class="views-field views-field-created"&gt; &lt;span class="field-content"&gt;&lt;time datetime="2024-12-16T08:16:44-06:00"&gt;Dec 16, 2024&lt;/time&gt; &lt;/span&gt; &lt;/div&gt;&lt;/div&gt; &lt;div class="article views-row"&gt; &lt;div class="views-field views-field-title"&gt; &lt;span class="field-content"&gt;&lt;a href="/news/chairpersons-file/2024-11-18-leadership-dialogue-advancing-health-care-innovation-amy-perry-president-and-ceo-banner" hreflang="en"&gt;Leadership Dialogue — Advancing Health Care Innovation with Amy Perry, President and CEO of Banner Health&lt;/a&gt;&lt;/span&gt; &lt;/div&gt;&lt;div class="views-field views-field-created"&gt; &lt;span class="field-content"&gt;&lt;time datetime="2024-11-18T10:04:06-06:00"&gt;Nov 18, 2024&lt;/time&gt; &lt;/span&gt; &lt;/div&gt;&lt;/div&gt; &lt;/div&gt; &lt;/div&gt; &lt;div class="more-link"&gt;&lt;a href="/topics/leadership-dialogue"&gt;Watch More Leadership Dialogues and Rounds Videos&lt;/a&gt;&lt;/div&gt; &lt;/section&gt; &lt;/div&gt; &lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Mon, 28 Apr 2025 10:30:00 -0500 Risk Management Strategy Integrating Cybersecurity & Board Governance /affinity-forum/cybersecurity-health-care/integrating-cybersecurity-board-governance &lt;div&gt;&lt;/div&gt;&lt;div&gt; /* Banner_Title_Overlay_Bar */ .Banner_Title_Overlay_Bar { position: relative; display: block; overflow: hidden; max-width: 1170px; margin: 0px auto 25px auto; } .Banner_Title_Overlay_Bar h1 { position: absolute; bottom: 40px; color: #003087; background-color: rgba(255, 255, 255, .8); width: 100%; padding: 20px 40px; font-size: 3em; box-shadow: 0 3px 8px -5px rgba(0, 0, 0, .6); } @media (max-width:991px) { .Banner_Title_Overlay_Bar h1 { bottom: 0px; margin: 0px; font-size: 2.5em; } } @media (max-width:767px) { .Banner_Title_Overlay_Bar h1 { font-size: 2em; text-align: center; text-indent: 0px; padding: 10px 20px; } } @media (max-width:530px) { .Banner_Title_Overlay_Bar h1 { position: relative; background-color: #63666A22; } } /* Banner_Title_Overlay_Bar // */ /* center_body */ .center_body { /*margin-top:50px;*/ margin-bottom: 50px; font-size: 16px } .center_body h3 {} .center_body p { font-size: 16px } p.center_Intro { color: #002855; line-height: 1.2em; font-size: 30px; margin: 10px 0 25px 0; font-weight: 700; font-size: 2em; } @media (max-width:768px) { p.center_Intro { line-height: 1.2em; font-size: 23px; font-size: 1.45em; } } .center_body .center_Lead { color: #63666A; font-weight: 300; line-height: 1.4; font-size: 21px; } /* center_body // */ /* y-hr3 */ .y-hr3{ clear: both; } .y-hr3 div:nth-child(2) { border-top: solid 2px lightgrey; margin: 50px 0px; height: 0px } /* y-hr3 // */ /* CenterCallout_a */ @media (min-width:768px){ .CenterCallout_a .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .CenterCallout_a .CenterCallout_2col.rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc(25% - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } .CenterCallout_a { background-color: #f6f6f6; margin-bottom:25px; } .CenterCallout_a .CenterCallout_a-Center { /*text-align: center;*/ font-size:16px; } .CenterCallout_a .CenterCallout_a_Holder{ margin-bottom:25px; } .CenterCallout_a h2 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h4 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h3 { margin: 25px 0 0 0; color: #555; font-size: .7em; text-transform: uppercase; font-weight: 400; letter-spacing: 3px; text-align:center; } .CenterCallout_a .CenterCallout_a_Wrapper{ display: block; margin: 15px 0 0 0; overflow: hidden; color: #002855; background-color: white; /*! background-color: white; */ border: solid 3px #f6f6f6; display: block; transition: .2s; color: #307fe2; height: 100%; } .CenterCallout_a .CenterCallout_a_Wrapper:hover { border: solid 3px #307fe2; } .CenterCallout_a .CenterCallout_a_Wrapper:hover img{ opacity: .6; transform: scale(1.05); transition: 3s; } .CenterCallout_a .CenterCallout_a_Icon{ margin-top: 5px; } .CenterCallout_a .CenterCallout_a_icon { width: auto; max-width:147px; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ color: #555; } /*.CenterCallout_a .CenterCallout_a_Wrapper:hover h2,*/ .CenterCallout_a .CenterCallout_a_Wrapper:hover .CenterCallout_a_SectionTitle a{ color: #555; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ font-size: 1.2em; padding: 0 10px; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_1{ color: #d50032; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_2{ color: #002855; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_3{ color: #69b3e7; } .CenterCallout_a .CenterCallout_a_Wrapper h2:hover { transition: .2s; } .CenterCallout_a .CenterCallout_a_Wrapper p{ line-height: 1.6em; padding: 0 10px 15px 10px; color: #333; font-size:16px; } .CenterCallout_a .CenterCallout_a_Wrapper ul, .CenterCallout_a .CenterCallout_a_Wrapper ol{ line-height: 1.6em; color: #333; text-align: left; } .CenterCallout_a ul { list-style: none; /* Remove default bullets */ padding-left: 30px; margin-top:15px; margin-bottom: 25px; padding-right:15px; } .CenterCallout_a ul li { margin-bottom: 7px; line-height: 1.5em; padding-left: 23px; text-indent: -23px; font-size:16px; } .CenterCallout_a ul li::before { content: " "; font-size: 1em; margin-right: 5px; display: inline-block; height: 12px; background-color: #d50032; width: 12px; position: relative; top: 0px; } @media (max-width:991px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 100%; } } @media (max-width:768px) { .CenterCallout_a .CenterCallout_a_Wrapper { min-height: 100%; /* Was 480px*/ } } @media (max-width:432px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 220px; margin: 5px 0; } /*.CenterCallout_a .CenterCallout_a_Wrapper p, .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:360px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 195px; margin: 5px 0; } .CenterCallout_a .CenterCallout_a_Wrapper h2 { font-size: 1em; padding: 0 5px; } /*.CenterCallout_a .CenterCallout_a_Wrapper p .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:991px) and (min-width:568px){ .CenterCallout_a CenterCallout_a_ul{ width: 75%; margin: auto; } } h2{ color: #002855; font-size: 2.15em; margin: 0 0 15px 0; } &lt;/div&gt;&lt;div&gt;&lt;header class="Banner_Title_Overlay_Bar"&gt;&lt;img src="/sites/default/files/2018-08/Cybersecurity_1170x250.jpg" alt="Banner Image"&gt;&lt;div&gt;&lt;h1&gt;Integrating Cybersecurity &amp;amp; Board Governance&lt;/h1&gt;&lt;/div&gt;&lt;/header&gt;&lt;/div&gt;&lt;div class="raw-html-embed"&gt; /* CntMenuSub */ .CntMenuSub{ margin:20px 0px; padding-bottom: 5px; color: #afb1b1; letter-spacing: 1.5px; font-weight: 400; font-size: 11.2px; } .CntMenuSub a{ text-decoration:none } .CntMenuSub .CntMenuBar{ border-bottom: 1px solid lightblue; } /* if includes a logo */ @media (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ margin-top: 10px; float: left; width: calc(100% - 425px); } } @media (max-width:767px) and (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ float: left; width: calc(100% - 0px); } .CntMenuSub.CntMenuSubLogo img{ width: auto; } } /* // */ .CntMenuSub .CntMenuBar a:after{ content: "|"; padding: 0 3px 0 6px; color: #555; } .CntMenuSub .CntMenuBar a:last-child:after{ content: ""; } .CntMenuSub .CntMenuSubHome, .CntMenuSub .CntMenuSubParent{ text-transform: uppercase; color: #555; opacity: .9; } .CntMenuSub .CntMenuSubParent{ } .CntMenuSub .CntMenuSubChild{ } .CntMenuSub .CntMenuSubCurrent{ opacity: .7; } .CntMenuSub .CntMenuSubHome:hover, .CntMenuSub .CntMenuSubParent:hover{ text-transform: uppercase; color: #d50032; } /* CntMenuSub // */ &lt;div class="container CntMenuSub"&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;div class="col-md-10 row CntMenuBar"&gt; &lt;a class="CntMenuSubHome" href="/cybersecurity"&gt;Cybersecurity&lt;/a&gt; &lt;a class="CntMenuSubParent" href="/affinity-forum/cybersecurity-health-care"&gt;Cybersecurity In Health Care&lt;/a&gt; &lt;span class="CntMenuSubChild" id="CntMenuSubChild"&gt;&lt;/span&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;/div&gt; var url = window.location.pathname; var path = url.split('/').slice(-3, 2).join('/'); var pathreplace = path.replace(/-/g, " "); document.getElementById("CntMenuSubHome").innerHTML =(pathreplace); var url = window.location.pathname; var path = url.split('/').slice(-2, 3).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParent").innerHTML =(pathreplace2); var url = window.location.pathname; var path = url.split('/').slice(1, 2).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParentOnly").innerHTML =(pathreplace2); var y = document.getElementsByTagName("h1"); document.getElementById("CntMenuSubChild").innerHTML = y[0].innerHTML; &lt;/div&gt;&lt;div class="row"&gt;&lt;div class="col-md-12"&gt;&lt;h2 class="text-align-center"&gt;AHA Affinity Forum | Cybersecurity: Session III&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-md-6"&gt;&lt;div class="embed-responsive embed-responsive-16by9"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-6 center_body"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;p&gt;Session III concentrates on board governance and the importance of integrating cybersecurity into organizational strategies. We explored methods to effectively communicate cybersecurity risks to board members, enabling them to allocate resources and prioritize cybersecurity efforts. We also covered establishing an integrated cyber and enterprise risk program to enable boards to measure progress and govern the effectiveness of cybersecurity initiatives.&lt;/p&gt;&lt;p&gt;A collection of hospital leaders will be joining the panel discussions to provide a health care perspective. This discussion included health care insights from:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Kathy Hughes, VP &amp;amp; Chief Information Security Officer, Northwell Health&lt;/li&gt;&lt;li&gt;Erik Decker, VP &amp;amp; Chief Information Security Officer, Intermountain Healthcare&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="row spacer"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;h2&gt;Virtual Panel Hosts&lt;/h2&gt; /* people */ .people { margin-top: 50px; } .people img:nth-child(1) { border-radius: 200px; -moz-border-radius: 200px; -webkit-border-radius: 200px; margin-bottom: 10px; /*max-width:200px; for Transformation Talks */ display:block; /* for Transformation Talks */ margin:auto; /* for Transformation Talks */ } .people img:nth-child(1):hover { opacity: .7 } @media (max-width:991px) { .people { margin: auto; } .people p { text-align: center } } .ci_profile { margin-bottom: 30px; display: block; text-align: center; } @media (max-width:991px) { .ci_profile { text-align: center } } .ci_profile p { margin: 0 0 7px 0 } .ci_profile_name { font-weight: 700; font-size: 20px; } p.ci_profile_name { font-size: 1.5em; } .ci_profile_title { font-style: italic; line-height: 1.3em } .ci_profile_company { font-size: 1em; } p.ci_profile_award { font-size: .8em; text-align:center; color:#55555599; font-weight: 700 } .ci_profile_social { width: auto; } .ci_profile_social i { padding-right: 25px; font-size: 20px } .ci_profile_social a:last-of-type i { padding-right: 0px; } #ci_footer-social { font-size: 1.5em; padding-top: 0px; width: 100%; text-align: right; } @media (max-width:991px) { .ci_logo { margin-top: 25px } .ci_social p { text-align: center !important; } #ci_footer-social { text-align: center } } /* // */ /* .people3 .rowEqual_768 */ @media (min-width:769px){ .people3{ clear: both } .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people3 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: inherit; /*flex*/ width: calc((100% / 3) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } @media (max-width:767px) and (min-width:361px){ .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people4 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc((100% / 1) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } /* .people3 .rowEqual_768 // */ &lt;div class="row people people4"&gt;&lt;div class="row rowEqual_768"&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-john-riggi-300x300.jpg" alt="John Riggi"&gt;&lt;p class="ci_profile_name"&gt;John Riggi&lt;/p&gt;&lt;p class="ci_profile_title"&gt;National Advisor for Cybersecurity &amp;amp; Risk&lt;/p&gt;&lt;p class="ci_profile_company"&gt; Association&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-ed-gaudet-300x300.jpg" alt="Ed Gaudet"&gt;&lt;p class="ci_profile_name"&gt;Ed Gaudet&lt;/p&gt;&lt;p class="ci_profile_title"&gt;CEO and Founder&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-chris-logan-300x300.jpg" alt="Chris Logan"&gt;&lt;p class="ci_profile_name"&gt;Chris Logan&lt;/p&gt;&lt;p class="ci_profile_title"&gt;SVP &amp;amp; CISO&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="container-fluid CenterCallout_a"&gt;&lt;div class="row"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10 CenterCallout_a-Center"&gt;&lt;h2&gt;AHA Preferred Cybersecurity Providers | Censinet&lt;/h2&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;The AHA established the &lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;AHA Preferred Cybersecurity Provider&lt;/a&gt; (APCP) Program as part of its continued commitment to support our members as they develop and implement their cybersecurity strategies and initiatives.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;&lt;img src="/sites/default/files/2021-04/APCP_418x211.png"&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;&lt;strong&gt;AHA Affinity Forum is brought our members in collaboration with Censinet.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers"&gt;Censinet&lt;/a&gt; has been recognized for their proficiency in these services:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cyber Firm Risk Management and Information Governance&lt;/li&gt;&lt;li&gt;Cyber Risk Assessment, Privacy and HIPAA Compliance&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers" target="_blank"&gt;&lt;img src="/sites/default/files/2022-02/Logo_Censinet_834x313.jpg" alt="Censinet Logo" width="100%"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Fri, 02 Feb 2024 09:44:09 -0600 Risk Management Strategy Shifts In Digital Care Delivery & Implications To Patient Safety /affinity-forum/cybersecurity-health-care/shifts-digital-care-delivery-implications-patient-safety &lt;div&gt;&lt;/div&gt;&lt;div&gt; /* Banner_Title_Overlay_Bar */ .Banner_Title_Overlay_Bar { position: relative; display: block; overflow: hidden; max-width: 1170px; margin: 0px auto 25px auto; } .Banner_Title_Overlay_Bar h1 { position: absolute; bottom: 40px; color: #003087; background-color: rgba(255, 255, 255, .8); width: 100%; padding: 20px 40px; font-size: 3em; box-shadow: 0 3px 8px -5px rgba(0, 0, 0, .6); } @media (max-width:991px) { .Banner_Title_Overlay_Bar h1 { bottom: 0px; margin: 0px; font-size: 2.5em; } } @media (max-width:767px) { .Banner_Title_Overlay_Bar h1 { font-size: 2em; text-align: center; text-indent: 0px; padding: 10px 20px; } } @media (max-width:530px) { .Banner_Title_Overlay_Bar h1 { position: relative; background-color: #63666A22; } } /* Banner_Title_Overlay_Bar // */ /* center_body */ .center_body { /*margin-top:50px;*/ margin-bottom: 50px; font-size: 16px } .center_body h3 {} .center_body p { font-size: 16px } p.center_Intro { color: #002855; line-height: 1.2em; font-size: 30px; margin: 10px 0 25px 0; font-weight: 700; font-size: 2em; } @media (max-width:768px) { p.center_Intro { line-height: 1.2em; font-size: 23px; font-size: 1.45em; } } .center_body .center_Lead { color: #63666A; font-weight: 300; line-height: 1.4; font-size: 21px; } /* center_body // */ /* y-hr3 */ .y-hr3{ clear: both; } .y-hr3 div:nth-child(2) { border-top: solid 2px lightgrey; margin: 50px 0px; height: 0px } /* y-hr3 // */ /* CenterCallout_a */ @media (min-width:768px){ .CenterCallout_a .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .CenterCallout_a .CenterCallout_2col.rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc(25% - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } .CenterCallout_a { background-color: #f6f6f6; margin-bottom:25px; } .CenterCallout_a .CenterCallout_a-Center { /*text-align: center;*/ font-size:16px; } .CenterCallout_a .CenterCallout_a_Holder{ margin-bottom:25px; } .CenterCallout_a h2 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h4 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h3 { margin: 25px 0 0 0; color: #555; font-size: .7em; text-transform: uppercase; font-weight: 400; letter-spacing: 3px; text-align:center; } .CenterCallout_a .CenterCallout_a_Wrapper{ display: block; margin: 15px 0 0 0; overflow: hidden; color: #002855; background-color: white; /*! background-color: white; */ border: solid 3px #f6f6f6; display: block; transition: .2s; color: #307fe2; height: 100%; } .CenterCallout_a .CenterCallout_a_Wrapper:hover { border: solid 3px #307fe2; } .CenterCallout_a .CenterCallout_a_Wrapper:hover img{ opacity: .6; transform: scale(1.05); transition: 3s; } .CenterCallout_a .CenterCallout_a_Icon{ margin-top: 5px; } .CenterCallout_a .CenterCallout_a_icon { width: auto; max-width:147px; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ color: #555; } /*.CenterCallout_a .CenterCallout_a_Wrapper:hover h2,*/ .CenterCallout_a .CenterCallout_a_Wrapper:hover .CenterCallout_a_SectionTitle a{ color: #555; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ font-size: 1.2em; padding: 0 10px; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_1{ color: #d50032; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_2{ color: #002855; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_3{ color: #69b3e7; } .CenterCallout_a .CenterCallout_a_Wrapper h2:hover { transition: .2s; } .CenterCallout_a .CenterCallout_a_Wrapper p{ line-height: 1.6em; padding: 0 10px 15px 10px; color: #333; font-size:16px; } .CenterCallout_a .CenterCallout_a_Wrapper ul, .CenterCallout_a .CenterCallout_a_Wrapper ol{ line-height: 1.6em; color: #333; text-align: left; } .CenterCallout_a ul { list-style: none; /* Remove default bullets */ padding-left: 30px; margin-top:15px; margin-bottom: 25px; padding-right:15px; } .CenterCallout_a ul li { margin-bottom: 7px; line-height: 1.5em; padding-left: 23px; text-indent: -23px; font-size:16px; } .CenterCallout_a ul li::before { content: " "; font-size: 1em; margin-right: 5px; display: inline-block; height: 12px; background-color: #d50032; width: 12px; position: relative; top: 0px; } @media (max-width:991px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 100%; } } @media (max-width:768px) { .CenterCallout_a .CenterCallout_a_Wrapper { min-height: 100%; /* Was 480px*/ } } @media (max-width:432px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 220px; margin: 5px 0; } /*.CenterCallout_a .CenterCallout_a_Wrapper p, .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:360px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 195px; margin: 5px 0; } .CenterCallout_a .CenterCallout_a_Wrapper h2 { font-size: 1em; padding: 0 5px; } /*.CenterCallout_a .CenterCallout_a_Wrapper p .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:991px) and (min-width:568px){ .CenterCallout_a CenterCallout_a_ul{ width: 75%; margin: auto; } } h2{ color: #002855; font-size: 2.15em; margin: 0 0 15px 0; } &lt;/div&gt;&lt;div&gt;&lt;header class="Banner_Title_Overlay_Bar"&gt;&lt;img src="/sites/default/files/2018-08/Cybersecurity_1170x250.jpg" alt="Banner Image" width="1170" height="250"&gt;&lt;div&gt;&lt;h1&gt;Shifts In Digital Care Delivery &amp;amp; Implications To Patient Safety&lt;/h1&gt;&lt;/div&gt;&lt;/header&gt;&lt;/div&gt;&lt;div class="raw-html-embed"&gt; /* CntMenuSub */ .CntMenuSub{ margin:20px 0px; padding-bottom: 5px; color: #afb1b1; letter-spacing: 1.5px; font-weight: 400; font-size: 11.2px; } .CntMenuSub a{ text-decoration:none } .CntMenuSub .CntMenuBar{ border-bottom: 1px solid lightblue; } /* if includes a logo */ @media (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ margin-top: 10px; float: left; width: calc(100% - 425px); } } @media (max-width:767px) and (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ float: left; width: calc(100% - 0px); } .CntMenuSub.CntMenuSubLogo img{ width: auto; } } /* // */ .CntMenuSub .CntMenuBar a:after{ content: "|"; padding: 0 3px 0 6px; color: #555; } .CntMenuSub .CntMenuBar a:last-child:after{ content: ""; } .CntMenuSub .CntMenuSubHome, .CntMenuSub .CntMenuSubParent{ text-transform: uppercase; color: #555; opacity: .9; } .CntMenuSub .CntMenuSubParent{ } .CntMenuSub .CntMenuSubChild{ } .CntMenuSub .CntMenuSubCurrent{ opacity: .7; } .CntMenuSub .CntMenuSubHome:hover, .CntMenuSub .CntMenuSubParent:hover{ text-transform: uppercase; color: #d50032; } /* CntMenuSub // */ &lt;div class="container CntMenuSub"&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;div class="col-md-10 row CntMenuBar"&gt; &lt;a class="CntMenuSubHome" href="/cybersecurity"&gt;Cybersecurity&lt;/a&gt; &lt;a class="CntMenuSubParent" href="/affinity-forum/cybersecurity-health-care"&gt;Cybersecurity In Health Care&lt;/a&gt; &lt;span class="CntMenuSubChild" id="CntMenuSubChild"&gt;&lt;/span&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;/div&gt; var url = window.location.pathname; var path = url.split('/').slice(-3, 2).join('/'); var pathreplace = path.replace(/-/g, " "); document.getElementById("CntMenuSubHome").innerHTML =(pathreplace); var url = window.location.pathname; var path = url.split('/').slice(-2, 3).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParent").innerHTML =(pathreplace2); var url = window.location.pathname; var path = url.split('/').slice(1, 2).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParentOnly").innerHTML =(pathreplace2); var y = document.getElementsByTagName("h1"); document.getElementById("CntMenuSubChild").innerHTML = y[0].innerHTML; &lt;/div&gt;&lt;div class="row"&gt;&lt;div class="col-md-12"&gt;&lt;h2 class="text-align-center"&gt;AHA Affinity Forum | Cybersecurity: Session I&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-md-6"&gt;&lt;div class="embed-responsive embed-responsive-16by9"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-6 center_body"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;p&gt;In Session I, we explored the implications of digital transformation in health care delivery models. Our experts analyzed how technical vulnerabilities in third-party technologies used in hospitals and health systems may translate to a data security and patient safety risk. The panel also discussed best practices to ensure the security of emerging technologies and protect patient data and safety.&lt;/p&gt;&lt;p&gt;A collection of hospital leaders will be joining the panel discussions to provide a health care perspective. This discussion included health care insights from:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Aaron Miri, SVP, Chief Digital &amp;amp; Information Officer, Baptist Health&lt;/li&gt;&lt;li&gt;Joel Vengco, SVP and Chief Information &amp;amp; Digital Officer, Hartford HealthCare&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="row spacer"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;h2&gt;Virtual Panel Hosts&lt;/h2&gt; /* people */ .people { margin-top: 50px; } .people img:nth-child(1) { border-radius: 200px; -moz-border-radius: 200px; -webkit-border-radius: 200px; margin-bottom: 10px; /*max-width:200px; for Transformation Talks */ display:block; /* for Transformation Talks */ margin:auto; /* for Transformation Talks */ } .people img:nth-child(1):hover { opacity: .7 } @media (max-width:991px) { .people { margin: auto; } .people p { text-align: center } } .ci_profile { margin-bottom: 30px; display: block; text-align: center; } @media (max-width:991px) { .ci_profile { text-align: center } } .ci_profile p { margin: 0 0 7px 0 } .ci_profile_name { font-weight: 700; font-size: 20px; } p.ci_profile_name { font-size: 1.5em; } .ci_profile_title { font-style: italic; line-height: 1.3em } .ci_profile_company { font-size: 1em; } p.ci_profile_award { font-size: .8em; text-align:center; color:#55555599; font-weight: 700 } .ci_profile_social { width: auto; } .ci_profile_social i { padding-right: 25px; font-size: 20px } .ci_profile_social a:last-of-type i { padding-right: 0px; } #ci_footer-social { font-size: 1.5em; padding-top: 0px; width: 100%; text-align: right; } @media (max-width:991px) { .ci_logo { margin-top: 25px } .ci_social p { text-align: center !important; } #ci_footer-social { text-align: center } } /* // */ /* .people3 .rowEqual_768 */ @media (min-width:769px){ .people3{ clear: both } .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people3 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: inherit; /*flex*/ width: calc((100% / 3) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } @media (max-width:767px) and (min-width:361px){ .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people4 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc((100% / 1) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } /* .people3 .rowEqual_768 // */ &lt;div class="row people people4"&gt;&lt;div class="row rowEqual_768"&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-john-riggi-300x300.jpg" alt="John Riggi" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;John Riggi&lt;/p&gt;&lt;p class="ci_profile_title"&gt;National Advisor for Cybersecurity &amp;amp; Risk&lt;/p&gt;&lt;p class="ci_profile_company"&gt; Association&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-ed-gaudet-300x300.jpg" alt="Ed Gaudet" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;Ed Gaudet&lt;/p&gt;&lt;p class="ci_profile_title"&gt;CEO and Founder&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-chris-logan-300x300.jpg" alt="Chris Logan" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;Chris Logan&lt;/p&gt;&lt;p class="ci_profile_title"&gt;SVP &amp;amp; CISO&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="container-fluid CenterCallout_a"&gt;&lt;div class="row"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10 CenterCallout_a-Center"&gt;&lt;h2&gt;AHA Preferred Cybersecurity Providers | Censinet&lt;/h2&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;The AHA established the &lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;AHA Preferred Cybersecurity Provider&lt;/a&gt; (APCP) Program as part of its continued commitment to support our members as they develop and implement their cybersecurity strategies and initiatives.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;&lt;img src="/sites/default/files/2021-04/APCP_418x211.png" width="480" height="211"&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;&lt;strong&gt;AHA Affinity Forum is brought our members in collaboration with Censinet.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers"&gt;Censinet&lt;/a&gt; has been recognized for their proficiency in these services:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cyber Firm Risk Management and Information Governance&lt;/li&gt;&lt;li&gt;Cyber Risk Assessment, Privacy and HIPAA Compliance&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers" target="_blank"&gt;&lt;img src="/sites/default/files/2022-02/Logo_Censinet_834x313.jpg" alt="Censinet Logo" width="100%" height="100%"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Fri, 02 Feb 2024 09:39:28 -0600 Risk Management Strategy Cybersecurity In Health Care | AHA Affinity Forum /affinity-forum/cybersecurity-health-care &lt;div&gt;&lt;/div&gt;&lt;div&gt; /* Banner_Title_Overlay_Bar */ .Banner_Title_Overlay_Bar { position: relative; display: block; overflow: hidden; max-width: 1170px; margin: 0px auto 25px auto; } .Banner_Title_Overlay_Bar h1 { position: absolute; bottom: 40px; color: #003087; background-color: rgba(255, 255, 255, .8); width: 100%; padding: 20px 40px; font-size: 3em; box-shadow: 0 3px 8px -5px rgba(0, 0, 0, .6); } @media (max-width:991px) { .Banner_Title_Overlay_Bar h1 { bottom: 0px; margin: 0px; font-size: 2.5em; } } @media (max-width:767px) { .Banner_Title_Overlay_Bar h1 { font-size: 2em; text-align: center; text-indent: 0px; padding: 10px 20px; } } @media (max-width:530px) { .Banner_Title_Overlay_Bar h1 { position: relative; background-color: #63666A22; } } /* Banner_Title_Overlay_Bar // */ /* center_body */ .center_body { /*margin-top:50px;*/ margin-bottom: 50px; font-size: 16px } .center_body h3 {} .center_body p { font-size: 16px } p.center_Intro { color: #002855; line-height: 1.2em; font-size: 30px; margin: 10px 0 25px 0; font-weight: 700; font-size: 2em; } @media (max-width:768px) { p.center_Intro { line-height: 1.2em; font-size: 23px; font-size: 1.45em; } } .center_body .center_Lead { color: #63666A; font-weight: 300; line-height: 1.4; font-size: 21px; } /* center_body // */ /* y-hr3 */ .y-hr3{ clear: both; } .y-hr3 div:nth-child(2) { border-top: solid 2px lightgrey; margin: 50px 0px; height: 0px } /* y-hr3 // */ /* CenterCallout_a */ @media (min-width:768px){ .CenterCallout_a .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .CenterCallout_a .CenterCallout_2col.rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc(25% - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } .CenterCallout_a { background-color: #f6f6f6; margin-bottom:25px; } .CenterCallout_a .CenterCallout_a-Center { /*text-align: center;*/ font-size:16px; } .CenterCallout_a .CenterCallout_a_Holder{ margin-bottom:25px; } .CenterCallout_a h2 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h4 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h3 { margin: 25px 0 0 0; color: #555; font-size: .7em; text-transform: uppercase; font-weight: 400; letter-spacing: 3px; text-align:center; } .CenterCallout_a .CenterCallout_a_Wrapper{ display: block; margin: 15px 0 0 0; overflow: hidden; color: #002855; background-color: white; /*! background-color: white; */ border: solid 3px #f6f6f6; display: block; transition: .2s; color: #307fe2; height: 100%; } .CenterCallout_a .CenterCallout_a_Wrapper:hover { border: solid 3px #307fe2; } .CenterCallout_a .CenterCallout_a_Wrapper:hover img{ opacity: .6; transform: scale(1.05); transition: 3s; } .CenterCallout_a .CenterCallout_a_Icon{ margin-top: 5px; } .CenterCallout_a .CenterCallout_a_icon { width: auto; max-width:147px; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ color: #555; } /*.CenterCallout_a .CenterCallout_a_Wrapper:hover h2,*/ .CenterCallout_a .CenterCallout_a_Wrapper:hover .CenterCallout_a_SectionTitle a{ color: #555; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ font-size: 1.2em; padding: 0 10px; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_1{ color: #d50032; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_2{ color: #002855; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_3{ color: #69b3e7; } .CenterCallout_a .CenterCallout_a_Wrapper h2:hover { transition: .2s; } .CenterCallout_a .CenterCallout_a_Wrapper p{ line-height: 1.6em; padding: 0 10px 15px 10px; color: #333; font-size:16px; } .CenterCallout_a .CenterCallout_a_Wrapper ul, .CenterCallout_a .CenterCallout_a_Wrapper ol{ line-height: 1.6em; color: #333; text-align: left; } .CenterCallout_a ul { list-style: none; /* Remove default bullets */ padding-left: 30px; margin-top:15px; margin-bottom: 25px; padding-right:15px; } .CenterCallout_a ul li { margin-bottom: 7px; line-height: 1.5em; padding-left: 23px; text-indent: -23px; font-size:16px; } .CenterCallout_a ul li::before { content: " "; font-size: 1em; margin-right: 5px; display: inline-block; height: 12px; background-color: #d50032; width: 12px; position: relative; top: 0px; } @media (max-width:991px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 100%; } } @media (max-width:768px) { .CenterCallout_a .CenterCallout_a_Wrapper { min-height: 100%; /* Was 480px*/ } } @media (max-width:432px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 220px; margin: 5px 0; } /*.CenterCallout_a .CenterCallout_a_Wrapper p, .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:360px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 195px; margin: 5px 0; } .CenterCallout_a .CenterCallout_a_Wrapper h2 { font-size: 1em; padding: 0 5px; } /*.CenterCallout_a .CenterCallout_a_Wrapper p .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:991px) and (min-width:568px){ .CenterCallout_a CenterCallout_a_ul{ width: 75%; margin: auto; } } h2{ color: #002855; font-size: 2.15em; margin: 0 0 15px 0; } &lt;/div&gt;&lt;div&gt;&lt;header class="Banner_Title_Overlay_Bar"&gt;&lt;img src="/sites/default/files/2018-08/Cybersecurity_1170x250.jpg" alt="Banner Image" width="1170" height="250"&gt;&lt;div&gt;&lt;h1&gt;Cybersecurity In Healthcare | AHA Affinity Forum&lt;/h1&gt;&lt;/div&gt;&lt;/header&gt;&lt;/div&gt; @media (min-width:768px){ .sp_CTA1b_holder{ top:-15px; } } @media (max-width:767px){ .sp_CTA1b_holder{ top:-50px; margin: 0px 50px; } } .sp_CTA1b_holder{ background-color: #fff; padding:15px 15px 0; position: relative; overflow: auto; border: solid 2px #307FE2; text-align:center; } .sp_CTA1b h3{ color:#002855; font-size: 1.4em; margin: 0px; } .sp_CTA1b span{ display:block; margin-top:10px } .sp_CTA1b span a{ color:#d50032; } .sp_CTA1b span a:hover{ color:#651d32; } &lt;div class="row sp_CTA1b"&gt;&lt;div class="col-sm-8 col-sm-offset-2 sp_CTA1b_holder"&gt;&lt;h3&gt;AHA Affinity Forum is brought to our members in collaboration with Censient&lt;/h3&gt;&lt;img src="https://sponsor.aha.org/sites/default/files/2022-02/Logo_Censinet_834x313.jpg" alt="Censinet logo" width="834" height="313"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="raw-html-embed"&gt; /* CntMenuSub */ .CntMenuSub{ margin:20px 0px; padding-bottom: 5px; color: #afb1b1; letter-spacing: 1.5px; font-weight: 400; font-size: 11.2px; } .CntMenuSub a{ text-decoration:none } .CntMenuSub .CntMenuBar{ border-bottom: 1px solid lightblue; } /* if includes a logo */ @media (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ margin-top: 10px; float: left; width: calc(100% - 425px); } } @media (max-width:767px) and (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ float: left; width: calc(100% - 0px); } .CntMenuSub.CntMenuSubLogo img{ width: auto; } } /* // */ .CntMenuSub .CntMenuBar a:after{ content: "|"; padding: 0 3px 0 6px; color: #555; } .CntMenuSub .CntMenuBar a:last-child:after{ content: ""; } .CntMenuSub .CntMenuSubHome, .CntMenuSub .CntMenuSubParent{ text-transform: uppercase; color: #555; opacity: .9; } .CntMenuSub .CntMenuSubParent{ } .CntMenuSub .CntMenuSubChild{ } .CntMenuSub .CntMenuSubCurrent{ opacity: .7; } .CntMenuSub .CntMenuSubHome:hover, .CntMenuSub .CntMenuSubParent:hover{ text-transform: uppercase; color: #d50032; } /* CntMenuSub // */ &lt;div class="container CntMenuSub"&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;div class="col-md-10 row CntMenuBar"&gt; &lt;a class="CntMenuSubHome" href="/cybersecurity"&gt;Cybersecurity&lt;/a&gt; &lt;span class="CntMenuSubChild" id="CntMenuSubChild"&gt;&lt;/span&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;/div&gt; var url = window.location.pathname; var path = url.split('/').slice(-3, 2).join('/'); var pathreplace = path.replace(/-/g, " "); document.getElementById("CntMenuSubHome").innerHTML =(pathreplace); var url = window.location.pathname; var path = url.split('/').slice(-2, 3).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParent").innerHTML =(pathreplace2); var url = window.location.pathname; var path = url.split('/').slice(1, 2).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParentOnly").innerHTML =(pathreplace2); var y = document.getElementsByTagName("h1"); document.getElementById("CntMenuSubChild").innerHTML = y[0].innerHTML; &lt;/div&gt; .sp_Lead p { color:#002855; line-height: 1.2em; font-size: 30px; margin: 10px 0 25px 0; font-weight: 700; font-size: 2.15em; } .sp_Lead_Paragragh p { font-size:16px } &lt;div class="row sp_Lead_Paragragh"&gt;&lt;div class="col-sm-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;Interactive Virtual Panel Discussion with Hospital Leaders and Cybersecurity Experts&lt;/h2&gt;&lt;p&gt;Join the Association (AHA) and Censinet for a 3-part series of interactive virtual panel discussions on key aspects of cybersecurity in health care. John Riggi, the AHA's national advisor for cybersecurity and risk, hosts industry experts and hospital leaders as they provide insights on shifts in care delivery, cyber transformation and board governance. Each session allows time for the panel discussion and interaction with attendees.&lt;/p&gt;&lt;p&gt;These candid virtual discussions give you a chance to speak directly with our expert panel about security concerns that are top of mind at your organization. A collection of hospital leaders joined the panel to provide a health care perspective.&lt;/p&gt;&lt;p&gt;Panel discussions included health care insights and hospital stories from:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Aaron Miri, &lt;em&gt;SVP, Chief Digital &amp;amp; Information Officer&lt;/em&gt;, Baptist Health&lt;/li&gt;&lt;li&gt;Joel Vengco, &lt;em&gt;SVP and Chief Information &amp;amp; Digital Officer&lt;/em&gt;, Hartford HealthCare&lt;/li&gt;&lt;li&gt;Greg Garneau, &lt;em&gt;Chief Information Security Officer&lt;/em&gt;, Marshfield Clinic&lt;/li&gt;&lt;li&gt;Jay Bhat, &lt;em&gt;Chief Information Security Officer&lt;/em&gt;, Franciscan Alliance&lt;/li&gt;&lt;li&gt;Kathy Hughes, &lt;em&gt;VP &amp;amp; Chief Information Security Officer&lt;/em&gt;, Northwell Health&lt;/li&gt;&lt;li&gt;Erik Decker, &lt;em&gt;VP &amp;amp; Chief Information Security Officer&lt;/em&gt;, Intermountain Healthcare&lt;/li&gt;&lt;/ul&gt;&lt;div class="row spacer rowEqual-768-2"&gt; .BlockViewCalendar3 { margin:25px auto; padding-bottom:15px } /* Equal */ @media (min-width:992px){ .resource-block .resource-view .views-row { /* width: calc((100%/3) - 20px); float:left; */ margin:10px; } .rowEqual-768 .resource-view, .rowEqual-768-2 .resource-view{ display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .rowEqual-768-2 .resource-view&amp;gt;[class*='art'] { -ms-flex: 1; /* IE 10 */ flex: inherit; width: calc((100%/3) - 20px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } .article.views-row{ height:100%; } /* /Equal */ /* Date */ .views-field.views-field-field-start-date-time{ /* margin: 0px; */ width: 50px; text-align: center; font-size:15px; padding:0px; font-weight:700; white-space: nowrap; overflow: hidden; /*text-overflow: ellipsis;*/ color: #ffffff; background-color: #002855; border-color: #002855; display: inline-block; float: left; border-top-left-radius: 5px; border-top-right-radius: 5px; } .views-field.views-field-field-start-date-time-1{ /* margin: 0px; */ width: 50px; text-align: center; font-size:15px; padding:0px; font-weight:700; white-space: nowrap; overflow: hidden; /*text-overflow: ellipsis;*/ color: #003087; background-color: #fff; border: #003087 1px solid; display: inline-block; float: left; clear: both; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; margin-bottom:10px; } /* /Date */ /* Title */ .resource-block .resource-view .views-row .views-field-title h3{ font-weight: 700; font-size: 1.2em; line-height: 1.2em; /* margin-left: 15px; */ display: flex; position: relative; left: 20px; /* width: calc(100% - 25px); */ padding-right: 15px; margin-top:0px; } .resource-block .resource-view .views-row .views-field-title h3 a{ color:#003087 } .resource-block .resource-view .views-row .views-field-title h3 a:hover{ color:#69B3e7 } /* /Title */ /* Date - inline */ .views-field-field-start-date-time-8{ margin-left:70px; color:#55555599; } .views-field-field-start-date-time-8 span, .views-field-field-start-date-time-2 span{ color:#55555599; font-weight:700 } .views-field-field-start-date-time-2{ color:#55555599; margin-top:20px; clear:both; } .views-field-field-start-date-time-2 p{ margin-bottom:20px; } /* Type of Event */ .views-field-field-event-format{ color:#55555599; font-weight:700; margin-top:-20px; margin-bottom:10px; } /* Button */ .event-registration-link, .views-field.views-field-field-external-registration-link-1{ text-align:center; margin-top:25px; } .event-registration-link .btn{ background-color: #002855; color: #fff; margin-bottom:15px; } .event-registration-link .btn:hover{ background-color: #548fb9; } /* /Button */ /* More Link */ .more-link { clear:both; float:right; } /* /More Link */ /* Image */ .views-field-field-media-featured-image{ margin-bottom:15px; } /* /Image */ /* Sponsor Image */ .views-field-field-media-sponsored-by-logo p{ color:#55555599; font-weight:700; margin-top:15px; margin-bottom:5px; text-align:center } .views-field-field-media-sponsored-by-logo img{ width:100%; max-width:175px; margin:auto; display:block } &lt;div class="views-element-container"&gt;&lt;section class="resource-block"&gt;&lt;div class="resource-wrapper"&gt;&lt;div class="resource-view"&gt;&lt;div class="article views-row"&gt; &lt;div class="field-content"&gt; &lt;article&gt; &lt;div class="field_media_image"&gt;&lt;img alt="xxxxxx" height="400" src="xxxxx" width="1200"&gt;&lt;/div&gt; &lt;/article&gt; &lt;/div&gt; &lt;/div&gt;--&amp;gt;&lt;div class="views-field views-field-field-start-date-time"&gt;&lt;div class="field-content"&gt;Aug&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-1"&gt;&lt;div class="field-content"&gt;29&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-title"&gt;&lt;h3&gt;&lt;a href="/affinity-forum/cybersecurity-health-care/shifts-digital-care-delivery-implications-patient-safety" title="AHA Affinity Forum | Cybersecurity In Healthcare: Shifts In Digital Care Delivery &amp;amp; Implications To Patient Safety" data-view-context="top-level-view" hreflang="en"&gt;&lt;span class="field-content"&gt;Shifts In Digital Care Delivery &amp;amp; Implications To Patient Safety&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-2"&gt;&lt;div class="field-content"&gt;&lt;p&gt;&lt;span&gt;Event Begins:&lt;/span&gt; Thu, Sep 28, 2023 | 11:45 AM ET&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-event-format"&gt;&lt;div class="field-content"&gt;Interactive Virtual Panel&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Explore the implications of shifting care delivery models on patient experience and identify the cybersecurity risks involved. Our experts will analyze vulnerabilities and develop robust measures to protect patient information and ensure the security of emerging technologies.&lt;/p&gt;&lt;/div&gt;&lt;div class="event-registration-link"&gt;&lt;a class="btn btn-wide btn-primary" href="/affinity-forum/cybersecurity-health-care/shifts-digital-care-delivery-implications-patient-safety" title="AHA Affinity Forum | Cybersecurity In Healthcare: Shifts In Digital Care Delivery &amp;amp; Implications To Patient Safety" data-view-context="top-level-view"&gt;&lt;span class="field-content"&gt;Video Replay&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="article views-row"&gt; &lt;div class="field-content"&gt; &lt;article&gt; &lt;div class="field_media_image"&gt;&lt;img alt="xxxxxx" height="400" src="xxxxx" width="1200"&gt;&lt;/div&gt; &lt;/article&gt; &lt;/div&gt; &lt;/div&gt;--&amp;gt;&lt;div class="views-field views-field-field-start-date-time"&gt;&lt;div class="field-content"&gt;Oct&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-1"&gt;&lt;div class="field-content"&gt;17&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-title"&gt;&lt;h3&gt;&lt;a href="/affinity-forum/cybersecurity-health-care/evaluating-impact-ai-health-care-cybersecurity" title="AHA Affinity Forum | Evaluating The Impact Of AI In Healthcare Cybersecurity" data-view-context="top-level-view" hreflang="en"&gt;&lt;span class="field-content"&gt;Evaluating The Impact Of AI In Healthcare Cybersecurity&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-2"&gt;&lt;div class="field-content"&gt;&lt;p&gt;&lt;span&gt;Event Begins:&lt;/span&gt; Tue, Oct 17, 2023 | 11:45 AM ET&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-event-format"&gt;&lt;div class="field-content"&gt;Interactive Virtual Panel&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Evaluating the impact of generative AI in healthcare, we will discuss protocols to safeguard AI-generated outputs and maintain patient privacy. We will also talk through the cybersecurity considerations surrounding AI technologies and remote patient monitoring devices.&lt;/p&gt;&lt;/div&gt;&lt;div class="event-registration-link"&gt;&lt;a class="btn btn-wide btn-primary" href="/affinity-forum/cybersecurity-health-care/evaluating-impact-ai-health-care-cybersecurity" title="AHA Affinity Forum | Evaluating The Impact Of AI In Healthcare Cybersecurity" data-view-context="top-level-view"&gt;&lt;span class="field-content"&gt;Video Replay&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="article views-row"&gt; &lt;div class="field-content"&gt; &lt;article&gt; &lt;div class="field_media_image"&gt;&lt;img alt="xxxxxx" height="400" src="xxxxx" width="1200"&gt;&lt;/div&gt; &lt;/article&gt; &lt;/div&gt; &lt;/div&gt;--&amp;gt;&lt;div class="views-field views-field-field-start-date-time"&gt;&lt;div class="field-content"&gt;Nov&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-1"&gt;&lt;div class="field-content"&gt;14&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-title"&gt;&lt;h3&gt;&lt;a href="/affinity-forum/cybersecurity-health-care/integrating-cybersecurity-board-governance" title="AHA Affinity Forum | Integrating Cybersecurity &amp;amp; Board Governance" data-view-context="top-level-view" hreflang="en"&gt;&lt;span class="field-content"&gt;Integrating Cybersecurity &amp;amp; Board Governance&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-start-date-time-2"&gt;&lt;div class="field-content"&gt;&lt;p&gt;&lt;span&gt;Event Begins:&lt;/span&gt; Tue, Nov 14, 2023 | 11:45 AM ET&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="views-field views-field-field-event-format"&gt;&lt;div class="field-content"&gt;Interactive Virtual Panel&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Learn about Board Governance and the importance of integrating cybersecurity into organizational strategies. We will explore methods to effectively communicate cybersecurity risks to board members, enabling them to allocate resources and prioritize cybersecurity efforts.&lt;/p&gt;&lt;/div&gt;&lt;div class="event-registration-link"&gt;&lt;a class="btn btn-wide btn-primary" href="/affinity-forum/cybersecurity-health-care/integrating-cybersecurity-board-governance" title="AHA Affinity Forum | Integrating Cybersecurity &amp;amp; Board Governance" data-view-context="top-level-view"&gt;&lt;span class="field-content"&gt;Video Replay&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/section&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="row"&gt;&lt;div class="col-sm-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-sm-10"&gt; /* people */ .people { margin-top: 50px; } .people img:nth-child(1) { border-radius: 200px; -moz-border-radius: 200px; -webkit-border-radius: 200px; margin-bottom: 10px } .people img:nth-child(1):hover { opacity: .7 } @media (max-width:991px) { .people { margin: auto; } .people p { text-align: center } } .ci_profile { margin-bottom: 30px; display: block; } @media (max-width:991px) { .ci_profile { text-align: center } } .ci_profile p { margin: 0 0 7px 0 } .ci_profile_name { font-weight: 700; font-size: 20px; } p.ci_profile_name { font-size: 1.5em; } .ci_profile_title { font-style: italic; line-height: 1.3em } .ci_profile_company { font-size: 1em; } p.ci_profile_award { font-size: .8em; text-align:center; color:#55555599; font-weight: 700 } .ci_profile_social { width: auto; } .ci_profile_social i { padding-right: 25px; font-size: 20px } .ci_profile_social a:last-of-type i { padding-right: 0px; } #ci_footer-social { font-size: 1.5em; padding-top: 0px; width: 100%; text-align: right; } @media (max-width:991px) { .ci_logo { margin-top: 25px } .ci_social p { text-align: center !important; } #ci_footer-social { text-align: center } } @media (min-width:540px){ .rowEqual_768{ display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .rowEqual_768&amp;gt;[class*='col'] { -ms-flex: 1; /* IE 10 */ flex: inherit; width: calc((100%/3) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } /* // */ &lt;div class="row people people4"&gt;&lt;h2 class="text-align-center"&gt;Virtual Panel Hosts&lt;/h2&gt;&lt;div class="row rowEqual_768"&gt;&lt;div class="col-md-4 col-sm-6 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-john-riggi-300x300.jpg" alt="John Riggi" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;John Riggi&lt;/p&gt;&lt;p class="ci_profile_title"&gt;National Advisor for Cybersecurity &amp;amp; Risk&lt;/p&gt;&lt;p class="ci_profile_company"&gt; Association&lt;/p&gt;&lt;p class="ci_profile_award"&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="ci_profile_social"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-6 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-ed-gaudet-300x300.jpg" alt="Ed Gaudet" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;Ed Gaudet&lt;/p&gt;&lt;p class="ci_profile_title"&gt;CEO and Founder&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;p class="ci_profile_award"&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="ci_profile_social"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-6 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-chris-logan-300x300.jpg" alt="Chris Logan" width="300" height="300"&gt;&lt;p class="ci_profile_name"&gt;Chris Logan&lt;/p&gt;&lt;p class="ci_profile_title"&gt;SVP &amp;amp; CISO&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;p class="ci_profile_award"&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="ci_profile_social"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt; &lt;a href="/center/next-generation-leaders-fellowship/scholarship"&gt;Age-Friendly Scholarship Recipient&lt;/a&gt; &lt;/p&gt; --&amp;gt; &lt;img alt="" src="sssssssssss"&gt; &lt;p class="ci_profile_name"&gt;xxxx&lt;/p&gt; &lt;p class="ci_profile_title"&gt;vvvvv&lt;/p&gt; &lt;p class="ci_profile_company"&gt;ddddd&lt;/p&gt; &lt;p class="ci_profile_award"&gt;hhhhh&lt;/p&gt; &lt;p class="ci_profile_award"&gt;&lt;a href="/center/next-generation-leaders-fellowship/scholarship"&gt;Age-Friendly Scholarship Recipient&lt;/a&gt;&lt;/p&gt; &lt;div class="ci_profile_social"&gt;&lt;/div&gt; &lt;/div&gt; --&amp;gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="row" id=""&gt;&lt;div class="col-md-10 col-md-offset-1"&gt;&lt;div class="col-md-12"&gt;&lt;h2&gt;AHA Preferred Cybersecurity Providers | Censinet&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-md-8"&gt;&lt;p&gt;The AHA established the AHA Preferred Cybersecurity Provider (APCP) Program as part of its continued commitment to support our members as they develop and implement their cybersecurity strategies and initiatives.&lt;/p&gt;&lt;p&gt;Censinet has been recognized for their proficiency in these services:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cyber Firm Risk Management and Information Governance&lt;/li&gt;&lt;li&gt;Cyber Risk Assessment, Privacy and HIPAA Compliance&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="col-md-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers"&gt;&lt;img src="/sites/default/files/2021-04/APCP_418x211.png" alt="APCP Logo" width="100%" height="100%"&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="col-md-8"&gt;&lt;p&gt;Trusted by leading healthcare providers, Censinet helps organizations address risk across their business, including vendors and third parties, patient data, medical records, research and IRB, medical devices, the supply chain, and more.&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4"&gt;&lt;a href="https://www.censinet.com/what-we-do/for-healthcare-vendors"&gt;&lt;img src="/sites/default/files/2022-02/Logo_Censinet_834x313.jpg " alt="APCP Logo" width="100%" height="100%"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Thu, 01 Feb 2024 13:40:43 -0600 Risk Management Strategy Evaluating the Impact of AI in Health Care Cybersecurity /affinity-forum/cybersecurity-health-care/evaluating-impact-ai-health-care-cybersecurity &lt;div&gt;&lt;/div&gt;&lt;div&gt; /* Banner_Title_Overlay_Bar */ .Banner_Title_Overlay_Bar { position: relative; display: block; overflow: hidden; max-width: 1170px; margin: 0px auto 25px auto; } .Banner_Title_Overlay_Bar h1 { position: absolute; bottom: 40px; color: #003087; background-color: rgba(255, 255, 255, .8); width: 100%; padding: 20px 40px; font-size: 3em; box-shadow: 0 3px 8px -5px rgba(0, 0, 0, .6); } @media (max-width:991px) { .Banner_Title_Overlay_Bar h1 { bottom: 0px; margin: 0px; font-size: 2.5em; } } @media (max-width:767px) { .Banner_Title_Overlay_Bar h1 { font-size: 2em; text-align: center; text-indent: 0px; padding: 10px 20px; } } @media (max-width:530px) { .Banner_Title_Overlay_Bar h1 { position: relative; background-color: #63666A22; } } /* Banner_Title_Overlay_Bar // */ /* center_body */ .center_body { /*margin-top:50px;*/ margin-bottom: 50px; font-size: 16px } .center_body h3 {} .center_body p { font-size: 16px } p.center_Intro { color: #002855; line-height: 1.2em; font-size: 30px; margin: 10px 0 25px 0; font-weight: 700; font-size: 2em; } @media (max-width:768px) { p.center_Intro { line-height: 1.2em; font-size: 23px; font-size: 1.45em; } } .center_body .center_Lead { color: #63666A; font-weight: 300; line-height: 1.4; font-size: 21px; } /* center_body // */ /* y-hr3 */ .y-hr3{ clear: both; } .y-hr3 div:nth-child(2) { border-top: solid 2px lightgrey; margin: 50px 0px; height: 0px } /* y-hr3 // */ /* CenterCallout_a */ @media (min-width:768px){ .CenterCallout_a .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .CenterCallout_a .CenterCallout_2col.rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc(25% - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } .CenterCallout_a { background-color: #f6f6f6; margin-bottom:25px; } .CenterCallout_a .CenterCallout_a-Center { /*text-align: center;*/ font-size:16px; } .CenterCallout_a .CenterCallout_a_Holder{ margin-bottom:25px; } .CenterCallout_a h2 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h4 { color: #002855; line-height: 1.2em; font-size: 30px; margin: 30px 0 30px 0; text-align:center; } .CenterCallout_a h3 { margin: 25px 0 0 0; color: #555; font-size: .7em; text-transform: uppercase; font-weight: 400; letter-spacing: 3px; text-align:center; } .CenterCallout_a .CenterCallout_a_Wrapper{ display: block; margin: 15px 0 0 0; overflow: hidden; color: #002855; background-color: white; /*! background-color: white; */ border: solid 3px #f6f6f6; display: block; transition: .2s; color: #307fe2; height: 100%; } .CenterCallout_a .CenterCallout_a_Wrapper:hover { border: solid 3px #307fe2; } .CenterCallout_a .CenterCallout_a_Wrapper:hover img{ opacity: .6; transform: scale(1.05); transition: 3s; } .CenterCallout_a .CenterCallout_a_Icon{ margin-top: 5px; } .CenterCallout_a .CenterCallout_a_icon { width: auto; max-width:147px; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ color: #555; } /*.CenterCallout_a .CenterCallout_a_Wrapper:hover h2,*/ .CenterCallout_a .CenterCallout_a_Wrapper:hover .CenterCallout_a_SectionTitle a{ color: #555; } .CenterCallout_a .CenterCallout_a_Wrapper .CenterCallout_a_SectionTitle{ font-size: 1.2em; padding: 0 10px; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_1{ color: #d50032; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_2{ color: #002855; } .CenterCallout_a .CenterCallout_a_Wrapper h2.CenterCallout_a_h_3{ color: #69b3e7; } .CenterCallout_a .CenterCallout_a_Wrapper h2:hover { transition: .2s; } .CenterCallout_a .CenterCallout_a_Wrapper p{ line-height: 1.6em; padding: 0 10px 15px 10px; color: #333; font-size:16px; } .CenterCallout_a .CenterCallout_a_Wrapper ul, .CenterCallout_a .CenterCallout_a_Wrapper ol{ line-height: 1.6em; color: #333; text-align: left; } .CenterCallout_a ul { list-style: none; /* Remove default bullets */ padding-left: 30px; margin-top:15px; margin-bottom: 25px; padding-right:15px; } .CenterCallout_a ul li { margin-bottom: 7px; line-height: 1.5em; padding-left: 23px; text-indent: -23px; font-size:16px; } .CenterCallout_a ul li::before { content: " "; font-size: 1em; margin-right: 5px; display: inline-block; height: 12px; background-color: #d50032; width: 12px; position: relative; top: 0px; } @media (max-width:991px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 100%; } } @media (max-width:768px) { .CenterCallout_a .CenterCallout_a_Wrapper { min-height: 100%; /* Was 480px*/ } } @media (max-width:432px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 220px; margin: 5px 0; } /*.CenterCallout_a .CenterCallout_a_Wrapper p, .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:360px) { .CenterCallout_a .CenterCallout_a_Wrapper{ min-height: 195px; margin: 5px 0; } .CenterCallout_a .CenterCallout_a_Wrapper h2 { font-size: 1em; padding: 0 5px; } /*.CenterCallout_a .CenterCallout_a_Wrapper p .CenterCallout_a .CenterCallout_a_Wrapper ul { display: none; }*/ } @media (max-width:991px) and (min-width:568px){ .CenterCallout_a CenterCallout_a_ul{ width: 75%; margin: auto; } } h2{ color: #002855; font-size: 2.15em; margin: 0 0 15px 0; } &lt;/div&gt;&lt;div&gt;&lt;header class="Banner_Title_Overlay_Bar"&gt;&lt;img src="/sites/default/files/2018-08/Cybersecurity_1170x250.jpg" alt="Banner Image"&gt;&lt;div&gt;&lt;h1&gt;Evaluating the Impact of AI in Health Care Cybersecurity&lt;/h1&gt;&lt;/div&gt;&lt;/header&gt;&lt;/div&gt;&lt;div class="raw-html-embed"&gt; /* CntMenuSub */ .CntMenuSub{ margin:20px 0px; padding-bottom: 5px; color: #afb1b1; letter-spacing: 1.5px; font-weight: 400; font-size: 11.2px; } .CntMenuSub a{ text-decoration:none } .CntMenuSub .CntMenuBar{ border-bottom: 1px solid lightblue; } /* if includes a logo */ @media (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ margin-top: 10px; float: left; width: calc(100% - 425px); } } @media (max-width:767px) and (min-width:361px){ .CntMenuSub.CntMenuSubLogo .CntMenuBar{ float: left; width: calc(100% - 0px); } .CntMenuSub.CntMenuSubLogo img{ width: auto; } } /* // */ .CntMenuSub .CntMenuBar a:after{ content: "|"; padding: 0 3px 0 6px; color: #555; } .CntMenuSub .CntMenuBar a:last-child:after{ content: ""; } .CntMenuSub .CntMenuSubHome, .CntMenuSub .CntMenuSubParent{ text-transform: uppercase; color: #555; opacity: .9; } .CntMenuSub .CntMenuSubParent{ } .CntMenuSub .CntMenuSubChild{ } .CntMenuSub .CntMenuSubCurrent{ opacity: .7; } .CntMenuSub .CntMenuSubHome:hover, .CntMenuSub .CntMenuSubParent:hover{ text-transform: uppercase; color: #d50032; } /* CntMenuSub // */ &lt;div class="container CntMenuSub"&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;div class="col-md-10 row CntMenuBar"&gt; &lt;a class="CntMenuSubHome" href="/cybersecurity"&gt;Cybersecurity&lt;/a&gt; &lt;a class="CntMenuSubParent" href="/affinity-forum/cybersecurity-health-care"&gt;Cybersecurity In Health Care&lt;/a&gt; &lt;span class="CntMenuSubChild" id="CntMenuSubChild"&gt;&lt;/span&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &amp;nbsp; &lt;/div&gt; &lt;/div&gt; var url = window.location.pathname; var path = url.split('/').slice(-3, 2).join('/'); var pathreplace = path.replace(/-/g, " "); document.getElementById("CntMenuSubHome").innerHTML =(pathreplace); var url = window.location.pathname; var path = url.split('/').slice(-2, 3).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParent").innerHTML =(pathreplace2); var url = window.location.pathname; var path = url.split('/').slice(1, 2).join('/'); var pathreplace2 = path.replace(/-/g, " "); document.getElementById("CntMenuSubParentOnly").innerHTML =(pathreplace2); var y = document.getElementsByTagName("h1"); document.getElementById("CntMenuSubChild").innerHTML = y[0].innerHTML; &lt;/div&gt;&lt;div class="row"&gt;&lt;div class="col-md-12"&gt;&lt;h2 class="text-align-center"&gt;AHA Affinity Forum | Cybersecurity: Session II&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-md-6"&gt;&lt;div class="embed-responsive embed-responsive-16by9"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-6 center_body"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;p&gt;In Session II, we delve into cyber transformation in the age of AI, as we evaluate both the benefits and the risk of the use of generative AI in health care. We discussed cybersecurity protocols and pending security and safety regulations surrounding the use AI of to inform clinical decision-making and to safeguard patient privacy and safety.&lt;/p&gt;&lt;p&gt;A collection of hospital leaders will be joining the panel discussions to provide a health care perspective. This discussion included health care insights from:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Greg Garneau, Chief Information Security Officer, Marshfield Clinic&lt;/li&gt;&lt;li&gt;Jay Bhat, Chief Information Security Officer, Franciscan Alliance&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="row spacer"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10"&gt;&lt;/p&gt; &lt;p class="center_Lead"&gt;&lt;/p&gt;--&amp;gt;&lt;h2&gt;Virtual Panel Hosts&lt;/h2&gt; /* people */ .people { margin-top: 50px; } .people img:nth-child(1) { border-radius: 200px; -moz-border-radius: 200px; -webkit-border-radius: 200px; margin-bottom: 10px; /*max-width:200px; for Transformation Talks */ display:block; /* for Transformation Talks */ margin:auto; /* for Transformation Talks */ } .people img:nth-child(1):hover { opacity: .7 } @media (max-width:991px) { .people { margin: auto; } .people p { text-align: center } } .ci_profile { margin-bottom: 30px; display: block; text-align: center; } @media (max-width:991px) { .ci_profile { text-align: center } } .ci_profile p { margin: 0 0 7px 0 } .ci_profile_name { font-weight: 700; font-size: 20px; } p.ci_profile_name { font-size: 1.5em; } .ci_profile_title { font-style: italic; line-height: 1.3em } .ci_profile_company { font-size: 1em; } p.ci_profile_award { font-size: .8em; text-align:center; color:#55555599; font-weight: 700 } .ci_profile_social { width: auto; } .ci_profile_social i { padding-right: 25px; font-size: 20px } .ci_profile_social a:last-of-type i { padding-right: 0px; } #ci_footer-social { font-size: 1.5em; padding-top: 0px; width: 100%; text-align: right; } @media (max-width:991px) { .ci_logo { margin-top: 25px } .ci_social p { text-align: center !important; } #ci_footer-social { text-align: center } } /* // */ /* .people3 .rowEqual_768 */ @media (min-width:769px){ .people3{ clear: both } .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people3 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: inherit; /*flex*/ width: calc((100% / 3) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } @media (max-width:767px) and (min-width:361px){ .people3 .rowEqual_768 { display: -webkit-box; display: -webkit-flex; display: -ms-flexbox; display: flex; flex-wrap: wrap; } .people4 .rowEqual_768&amp;gt;[class*='col-'] { -ms-flex: 1; /* IE 10 */ flex: auto; width: calc((100% / 1) - 2px) /*Adjust % for the number per row, will override the bootstrap - Also needed for Safari*/; } } /* .people3 .rowEqual_768 // */ &lt;div class="row people people4"&gt;&lt;div class="row rowEqual_768"&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-john-riggi-300x300.jpg" alt="John Riggi"&gt;&lt;p class="ci_profile_name"&gt;John Riggi&lt;/p&gt;&lt;p class="ci_profile_title"&gt;National Advisor for Cybersecurity &amp;amp; Risk&lt;/p&gt;&lt;p class="ci_profile_company"&gt; Association&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-ed-gaudet-300x300.jpg" alt="Ed Gaudet"&gt;&lt;p class="ci_profile_name"&gt;Ed Gaudet&lt;/p&gt;&lt;p class="ci_profile_title"&gt;CEO and Founder&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;div class="col-md-4 col-sm-4 ci_profile"&gt;&lt;img src="/sites/default/files/2023-08/affinity-chris-logan-300x300.jpg" alt="Chris Logan"&gt;&lt;p class="ci_profile_name"&gt;Chris Logan&lt;/p&gt;&lt;p class="ci_profile_title"&gt;SVP &amp;amp; CISO&lt;/p&gt;&lt;p class="ci_profile_company"&gt;Censinet&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class="container-fluid CenterCallout_a"&gt;&lt;div class="row"&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="col-md-10 CenterCallout_a-Center"&gt;&lt;h2&gt;AHA Preferred Cybersecurity Providers | Censinet&lt;/h2&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;The AHA established the &lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;AHA Preferred Cybersecurity Provider&lt;/a&gt; (APCP) Program as part of its continued commitment to support our members as they develop and implement their cybersecurity strategies and initiatives.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity"&gt;&lt;img src="/sites/default/files/2021-04/APCP_418x211.png"&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="col-sm-8"&gt;&lt;p&gt;&lt;strong&gt;AHA Affinity Forum is brought our members in collaboration with Censinet.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers"&gt;Censinet&lt;/a&gt; has been recognized for their proficiency in these services:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cyber Firm Risk Management and Information Governance&lt;/li&gt;&lt;li&gt;Cyber Risk Assessment, Privacy and HIPAA Compliance&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="col-sm-4"&gt;&lt;a href="/center/cybersecurity-and-risk-advisory-services/preferred-cybersecurity/providers" target="_blank"&gt;&lt;img src="/sites/default/files/2022-02/Logo_Censinet_834x313.jpg" alt="Censinet Logo" width="100%"&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-1"&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Thu, 01 Feb 2024 11:46:06 -0600 Risk Management Strategy Insider Risk Programs for the Healthcare and Public Health Sector: Implementation Guide /guidesreports/2020-08-07-insider-risk-programs-healthcare-and-public-health-sector-implementation &lt;p&gt;As a member of the Healthcare and Public Health Sector, you play a significant role in national security by protecting the nation and its economy from hazards such as terrorism, infectious disease outbreaks, and natural disasters.&lt;/p&gt; &lt;p&gt;Trusted insiders, both witting and unwitting, can cause grave harm to your organizations facilities, resources, information, and personnel. Insider incidents account for billions of dollars annually in “actual” and “potential” damages and lost revenue related to data breaches, trade secret theft, fraud, sabotage, damage to an organization’s reputation, acts of workplace violence, and more.&lt;/p&gt; &lt;p&gt;Implementation of an Insider Risk Program can help mitigate risks associated with trusted insiders. Click the links to learn how to establish an Insider Risk Program at your organization and develop a risk management strategy that addresses areas critical to healthcare and public health.&lt;/p&gt; &lt;div class="row"&gt; &lt;div class="col-md-2"&gt; &lt;p&gt;&lt;a href="/system/files?file=media/file/2020/08/InT_InsiderRisk_JobAid.pdf#page=2" target="_blank"&gt;&lt;strong&gt;Understanding Insider Risks&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &lt;p&gt;&amp;nbsp;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-2"&gt; &lt;p&gt;&lt;a href="/system/files?file=media/file/2020/08/InT_InsiderRisk_JobAid.pdf#page=3" target="_blank"&gt;&lt;strong&gt;Establishing an Insider Risk Program&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &lt;p&gt;&amp;nbsp;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-2"&gt; &lt;p&gt;&lt;a href="/system/files?file=media/file/2020/08/InT_InsiderRisk_JobAid.pdf#page=6" target="_blank"&gt;&lt;strong&gt;Insider Risk Management Strategy&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-1"&gt; &lt;p&gt;&amp;nbsp;&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-2"&gt; &lt;p&gt;&lt;a href="/system/files?file=media/file/2020/08/InT_InsiderRisk_JobAid.pdf#page=9" target="_blank"&gt;&lt;strong&gt;Insider Risk Program Resources&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;/div&gt; Fri, 07 Aug 2020 14:59:06 -0500 Risk Management Strategy Shared Risk May Be Key to Future Growth Opportunities /aha-center-health-innovation-market-scan/2020-06-16-shared-risk-may-be-key-future-growth &lt;div class="container row"&gt; &lt;div class="row"&gt; &lt;div class="col-md-8"&gt; &lt;p&gt;&lt;img alt="Shared Risk May Be Key to Future Growth Opportunities. A light bulb made out of paper on graph paper covered with business and productivity icons." data-entity-type="file" data-entity-uuid="9ef4747a-445c-45c1-a5f0-23681dbed085" src="/sites/default/files/inline-images/ms_060920_item1-innovations-620_1592553.jpg" width="620" height="381"&gt;&lt;/p&gt; &lt;p&gt;COVID-19 has taken a catastrophic financial toll on health care providers, with an estimated &lt;a href="/system/files/media/file/2020/05/aha-covid19-financial-impact-0520-FINAL.pdf" target="_blank"&gt;$202.6 billion loss between March and June for hospitals&lt;/a&gt; alone. This precipitated a sectorwide downgrade by &lt;a href="https://www.moodys.com/research/Moodys-Credit-stress-continues-to-rise-in-US-healthcare-sector--PBC_1217372?WT.mc_id=AM%7ERmluYW56ZW4ubmV0X1JTQl9SYXRpbmdzX05ld3NfTm9fVHJhbnNsYXRpb25z%7E20200309_PBC_1217372" target="_balnk"&gt;Moody’s&lt;/a&gt; and &lt;a href="https://www.fitchratings.com/healthcare-pharma" target="_blank"&gt;FitchRatings&lt;/a&gt; from stable to negative.&lt;/p&gt; &lt;p&gt;To make matters worse, this comes on the heels of a period during which many hospitals were already operating on razor-thin margins, especially in rural communities where &lt;a href="https://guidehouse.com/-/media/www/site/insights/healthcare/2020/ruralhospitalsustainabilityindex0420_rev01.pdf" target="_blank"&gt;nearly one in four face the risk of closure&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Innovation within this context may mean more shared-risk opportunities vs. traditional vendorbuyer relationships, notes Andy Shin, chief operating officer for the AHA’s Center for Health Innovation, in a recent &lt;a href="linkedin.com/pulse/health-care-embrace-three-innovation-trends-after-covid-19-andy-shin/" target="_blank"&gt;blog&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Defensive tools that reduce operational expenses may get first priority over new value creation for most, but net new revenue opportunities outside of patient care may be an offensive strategy for others. Shin cites three categories that will be especially ripe for new entrants, innovators and collaborators when COVID-19 subsides, including:&lt;/p&gt; &lt;h2&gt;Building a Bigger Digital Front Door&lt;/h2&gt; &lt;p&gt;Before a vaccine becomes available during the recovery phase, a hospital’s digital front door may be one of the most important channels to instill consumer confidence by providing easy access to clinical guidelines and directing patients to the appropriate levels of care, including virtual options. Other use cases like zero-contact intake tools and virtual waiting rooms not only facilitate social distancing, but also reduce wait times to see a doctor.&lt;/p&gt; &lt;p&gt;Once in the rebuilding mode, more hospitals and health systems likely will invest in expanding their digital front door capabilities, looking to enhance artificial intelligence (AI)-enabled tools, increasing access to patients’ own data and integrating patient engagement solutions more fully across the enterprise to empower consumers and decrease administrative burden. The &lt;a href="/center/aha-digital-pulse" target="_blank"&gt;AHA Digital Pulse website&lt;/a&gt;, created in concert with &lt;a href="https://aviahealth.com/" target="_blank"&gt;AVIA&lt;/a&gt;, allows organizations to assess how effectively they have established a digital front door.&lt;/p&gt; &lt;h2&gt;The Sharing Economy Comes to Health Care&lt;/h2&gt; &lt;p&gt;While sharing-economy platforms exist for individuals who share homes, cars and landscaping equipment, there hasn’t been a similar effort in health care for a variety of reasons. Yet, COVID-19 has created acute needs at varying times for different parts of the country, lending itself well to sharing-economy innovations.&lt;/p&gt; &lt;p&gt;For example, health systems were recruited to offer spare ventilators to the &lt;a href="https://www.ahadata.com/dynamic-ventilator-reserve" target="_blank"&gt;Dynamic Ventilator Reserve&lt;/a&gt;, a federal government-AHA partnership virtual inventory, so that they could be loaned easily to hot spots where they are needed most. Moving forward, we may see a wave of new entrants partner and scale marketplaces or even exchanges that help locate and trade for scarce medical supplies.&lt;/p&gt; &lt;p a able access acute apart approach be care chronic continue covid-19 disease during economy essential from height injuries is learned lesson need of or pandemic patients providing services sharing should supplies that the there timely to utilizing we with&gt; &lt;/p&gt;&lt;h2&gt;Compassion Tech&lt;/h2&gt; &lt;p&gt;Though COVID-19 is not solely responsible for widening the compassion divide, the opportunity to foster more of the human connection through technological channels will be an area of intense interest.&lt;/p&gt; &lt;p&gt;Facial recognition tools that provide instant feedback to clinicians on their demeanor via a computer screen can be effective in sending better body language signals or detect depression in patients — otherwise hidden in plain sight. AI tools that can assist families with difficult conversations about serious illness can help demystify what is still perceived by many as a taboo issue, Shin notes. Compassion tech could be the glue between health care and technology that we’ve been missing.&lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-4"&gt; &lt;p&gt;&lt;a href="/center" title="Visit the AHA Center for Health Innovation landing page."&gt;&lt;img alt="AHA Center for Health Innovation logo" data-entity- data-entity-uuid="7ade6b12-de98-4d0b-965f-a7c99d9463c5" src="/sites/default/files/inline-images/logo-aha-innovation-center-color-sm.jpg" type="file" class="align-center"&gt;&lt;/a&gt;&lt;/p&gt; &lt;a href="/center/form/innovation-subscription"&gt;&lt;img alt data-entity-type data-entity-uuid src="/sites/default/files/2019-04/Market_Scan_Call_Out_360x300.png"&gt;&lt;/a&gt;&lt;/div&gt; &lt;/div&gt; &lt;/div&gt; .field_featured_image { position: absolute; overflow: hidden; clip: rect(0 0 0 0); height: 1px; width: 1px; margin: -1px; padding: 0; border: 0; } .featured-image{ position: absolute; overflow: hidden; clip: rect(0 0 0 0); height: 1px; width: 1px; margin: -1px; padding: 0; border: 0; } Tue, 16 Jun 2020 11:05:25 -0500 Risk Management Strategy USP <800> Monograph and Risk Readiness Checklist Bundle /resources/2019-08-26-usp-monograph-and-risk-readiness-checklist-bundle &lt;div class="container"&gt;&lt;div class="row"&gt;&lt;div class="col-md-8"&gt;&lt;p&gt;&lt;img src="/sites/default/files/inline-images/USP_800_Monograph-and-Risk-Readiness-Checklist-Bundle-covers.png" data-entity-uuid="ca7029cb-a69c-4409-b520-3cfaaad2ed56" data-entity-type="file" alt="USP ‹800› Monograph and Risk Readiness Checklist Bundle covers." width="150" height="180" class="align-left"&gt;The aim of USP ‹800› is to protect health care workers and patients from harm associated with exposure to hazardous drugs (HDs). According to the Centers for Disease Control and Prevention (CDC), eight million health care workers are potentially exposed to HDs every year. This exposure can occur with workers who are unaware of their exposure and in departments outside of the pharmacy. USP &amp;lt;800&amp;gt; was developed to define the quality standards for the handling of HDs and the proper environmental controls for compounding to protect health care workers and patients. Aspects of handling HDs covered in USP &amp;lt;800&amp;gt; where exposure can occur include receiving, transporting, storing, compounding, dispensing, administering, spills, cleaning and waste disposal. Entities that handle HDs &lt;strong&gt;must&lt;/strong&gt; incorporate the standards in chapter &amp;lt;800&amp;gt; into their occupational safety plan. The plan’s health and safety management must, at a minimum, include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;List of HDs&lt;/li&gt;&lt;li&gt;Facility and engineering controls&lt;/li&gt;&lt;li&gt;Competent personnel&lt;/li&gt;&lt;li&gt;Safe work practices&lt;/li&gt;&lt;li&gt;Proper use of appropriate Personal Protective Equipment (PPE)&lt;/li&gt;&lt;li&gt;Policies for HD waste segregation and disposal&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This &lt;a href="https://www.ashe.org/" target="_blank" title="Visit American Society for Health Care Engineering"&gt;American Society for Health Care Engineering&lt;/a&gt; (ASHE) monograph discusses the physical environment provisions of USP &amp;lt;800&amp;gt; and is primarily intended for the use of health care facility managers. The USP &amp;lt;800&amp;gt; Risk Readiness Checklist, created by the American Society for Health Care Risk Management (ASHRM), will assist users in identifying areas where opportunities exist to comply with USP &amp;lt;800&amp;gt; required standards.&lt;/p&gt;&lt;div class="row"&gt;&lt;div class="col-md-12"&gt;&lt;div class="text-align-center"&gt;&lt;a class="btn btn-primary" href="https://ams.aha.org/eweb/DynamicPage.aspx?WebCode=ProdSearch&amp;amp;q=usp+800&amp;amp;" target="_blank" title="Purchase the print version"&gt;Purchase the Print Version&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-12 spacer"&gt;&lt;h2 class="text-align-center"&gt;Members-only Access&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-md-6"&gt;&lt;div class="text-align-center"&gt;&lt;a class="btn btn-primary" href="https://www.ashe.org/usp800#DigitalVersion" target="_blank" title="Access Member protected Digital versions"&gt;Access Digital Versions&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="col-md-6"&gt;&lt;div class="text-align-center"&gt;&lt;a class="btn btn-primary" href="https://www.ashe.org/usp800#VideoResources" target="_blank" title="Access Member protected Video Resources"&gt;Access Video Resources&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Additional Links &lt;/h2&gt; &lt;p&gt; &lt;a href="https://ams.aha.org/eweb/DynamicPage.aspx?WebCode=ProdSearch&amp;amp;q=usp+800&amp;amp;" target="_blank"&gt;Purchase the print version.&lt;/a&gt; &lt;/p&gt; &lt;p&gt; &lt;a href="https://www.ashe.org/usp800" target="_blank"&gt;ASHE members – download the PDF.&lt;/a&gt; &lt;/p&gt; &lt;p&gt; &lt;a href="https://www.ashe.org/usp800" target="_blank"&gt;View additional USP &amp;lt;800&amp;gt; resources.&lt;/a&gt; &lt;/p&gt; &lt;/div&gt; &lt;div class="col-md-4"&gt; &lt;div id="RM-target-lp-24660"&gt; &amp;nbsp; &lt;/div&gt; &lt;/div&gt; --&amp;gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt; Mon, 26 Aug 2019 15:57:23 -0500 Risk Management Strategy