Skip to main content
Skip to footer

The Cerner Podcast, Ep. 21: Don Lindsey on Cybersecurity



Published on 5/2/2017

Multiple high-profile breaches and cyberattacks impacted health care organizations' ability to provide basic care made front page news this past year. With so many attacks, the industry needs to invest in security measures that protect both businesses and patients.

In this episode of The Cerner Podcast, Don Lindsey discusses what organizations should be doing to ensure they're making the right investments in data security. Don is the vice president and chief information officer at Tallahassee Memorial Hospital, a not-for-profit community health care system that serves a 17-county region in North Florida and South Georgia.

In this podcast, Don answers the following questions:

  • Cybersecurity is a hot topic both inside and outside of the health care industry. Why are health care organizations a target and what are the biggest threats?
  • What barriers and challenges do you see to protecting patient information and general safety concerns against cyber attacks?
  • Health care organizations have a plethora of initiatives that demand significant investment. How does leadership prioritize security among all of the interests and how has that changed over the years?
  • While the government has enlisted mandated privacy regulations like HIPAA, it does not mandate cybersecurity tactics, yet. Describe how the OCR can and should offer guidance for providers in knowing what, where, when and how to invest in security to meet evolving threats and demands.
  • On the other side, provider organizations are able to develop their own strategies to combat additional security risks. What should health care organizations be doing to ensure they are making the right investments in data security?

Listen to Don's full episode below, or click here to view all episodes of The Cerner Podcast!

Cerner's Cybersecurity Risk Assessment makes it easy to see where your data security may be vulnerable—and what you can do to improve. To learn more and to request your cybersecurity risk assessment, click the button below.

Request your Assessment