HEALTHCARE SECURITY FORUM: A HIMSS EVENT
San Francisco, CA - June 11 - 12, 2018
Security veteran Tom August is the CISO of John Muir Health, a not-for-profit healthcare organization east of San Francisco that includes a 554-licensed bed and a 245-licensed bed medical center, which together are recognized as preeminent centers for neurosciences, orthopedics, cancer care, cardiovascular care and high-risk obstetrics. Tom is also the co-author of the CISO Handbook: A Practical Guide to Securing Your Company, which provides insights and guidance into designing and implementing an information security program and delivering true value to the stakeholders of a company.
Tom is an established information security and risk management leader with extensive experience in designing and implementing risk management programs. He specialize in developing governance processes, policies, risk assessment activities and innovative uses of technology to meet business and regulatory objectives. He is adept at collaborating with business leaders to develop risk management practices that balance legal and compliance requirements along with strategic business goals and operational objectives.
Tom previously served as the director of information security for Sharp HealthCare and on the Leadership Board of Directors for the National Health Information Sharing & Analysis Center (NH-ISAC).
In this session, security executives from two leading Bay Area healthcare organizations discuss the keys to creating strong resilient security programs that enable digital transformation and facilitate organizational business goals.
John Muir Health Vice President and CISO Tom August, in addition to his many years leading healthcare security teams, co-authored The CISO Handbook: a Practical Guide to Securing Your Company. El Camino Hospital CIO Deb Muro has lead large technology implementation projects and, over the past two years, has built El Camino’s security program from the ground up.
Both Tom and Deb strongly support using risk assessments to identify, prioritize, and address vulnerabilities, and they’ll share with attendees best practices for doing just that.