Access Management , Endpoint Security , Events

Tackling Healthcare's IAM Challenge

Jigar Kadakia of Partners HealthCare on How to Resolve Access Issues for Medical Professionals
Jigar Kadakia, CISO & CPO, Partners HealthCare

The traditional IAM strategy has been to tie individual users with a unique device. But that doesn’t work in healthcare settings, where doctors and nurses often share multiple devices. Jigar Kadakia of Partners HealthCare talks about how he approaches this critical challenge.

See Also: Real-World Strategies for Securing Remote Workforces and Data

In an interview recorded at ISMG’s NYC Healthcare Security Summit, Kadakia, the CISO and CPO at Partners, discusses:

  • The unique healthcare IAM challenge;
  • Why privileged access is particularly thorny;
  • How he has addressed these issues in his security and privacy roles at Partners.

Kadakia has more than 17 years of information security experience across multiple industries, with a focus on health care delivery and projects such as HIPAA/HITECH assessments, Meaningful Use assessment, ICD-10 related implementations, privacy program assessments and implementations, IT internal audit, and business associate risk management. Kadakia has spoken at many security and privacy forums/roundtables/conferences, and is a leader in the health care information security and privacy space. He has a Bachelor of Science degree in Chemical Engineering from the University of Cincinnati and a Master in Business Administration from Xavier University. He is CISSP, CIPP and HITRUST Certified. He is also certified in Risk and Information System Controls.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.