Group Purchasing
Group Purchasing

The What, Where and How of Protecting Healthcare Data

The What, Where and How of Protecting Healthcare Data (PDF, 3.59MB)Published: 06 Apr, 2015
Created by:
James Tarala
Kelli Tarala & James Tarala

Mitigating healthcare data-loss risk by understanding the What, Where, and How of Protecting Healthcare Data.

Meet the Experts

James Tarala
James Tarala

James Tarala

Senior Instructor

James is a managing partner at Cyverity, specializing in cybersecurity risk and governance. A SANS instructor for 20+ years, he holds 14 GIAC certs including the GSE, and has helped author the CIS Controls, CRF resources, and courses like LDR519.

Read more about James Tarala