Hospital Cybersecurity for Leadership and Staff

This course explains the creation and functions of cybersecurity measures to hospital leadership and operations departments that partner with compliance programs.

INTERESTED? Demo Course
Scroll Down Arrow


About this Course

This course examines the essential role of an enterprise-wide cybersecurity program. It explores the nature of vulnerabilities, common forms of cyberattacks, and past examples to illustrate the need for a rigorous compliance program and a robust culture of cybersecurity practices. It also reviews how an effective cybersecurity compliance strategy not only reduces risk but also enhances employee and patient trust, supports ethical behavior, and aligns with existing and emerging regulations.

Language Availability: English

Suggested Audiences: Compliance Officers, Finance Professionals, Healthcare Providers, Hospital Leadership, Hospital Staff

Organizational Subscription Price: Included as part of an annual subscription to our Hospital Cybersecurity series
Independent Learner Price: $99 per person


Course Content

Overview of System Vulnerabilities

This module looks into the intricate anatomy of hospital systems and their significance to operational efficiency and patient privacy. Emphasis is placed on the vulnerability of these systems to cyberthreats and the critical role cybersecurity plays in safeguarding hospital and patient well-being.

Recommended Use: Required
ID (Language): 21552 (English)
Author(s): Keith Duemling, MBA - Catholic Health, Long Island

Primary Forms of Cyberthreats

The module describes the different types of cyberattacks, including social engineering, ransomware, loss/theft of equipment, insider malicious behavior, and vulnerable connected devices. It also discusses methods of improving cyber supply chain management.

Recommended Use: Required
ID (Language): 21553 (English)
Author(s): Kurt Zanzi, CISSP, CHPC, OpenFAIR - Sutter Health

Risk Management and Mitigation

This module explains how cyber risk management and mitigation strategies safeguard digital assets, data, and operations from various threats and vulnerabilities. It describes how a proactive approach can minimize the potential harm caused by cyberattacks, data breaches, and other malicious activities.

Recommended Use: Required
ID (Language): 21555 (English)
Author(s): Kurt Zanzi, CISSP, CHPC, OpenFAIR - Sutter Health


Learn More

This field is for validation purposes and should be left unchanged.
Your Name(Required)
I'd Like To Receive Emails From CITI Program