Cyber attackers are becoming smarter and more organized, making it crucial for healthcare systems to stay ahead with robust cybersecurity measures.
In this episode of "The Future of AI in Health" podcast series, co-hosts Dr. Jenny Yu and Saul Marquez interview Ed Gaudet, CEO and founder of Censinet, on how AI revolutionizes healthcare, particularly in third-party risk and enterprise risk management. Ed shares how his company is revolutionizing the way hospitals assess the cybersecurity readiness of third-party vendors through automation and a multi-sided network, drastically reducing the time required for cybersecurity risk assessments in healthcare. Addressing the complexities of AI in healthcare, he emphasizes the importance of robust governance. He also explains why organizations need to establish clear policies for AI use, considering the unique risks associated with AI, which extend beyond traditional cybersecurity threats.
Join us as we explore the future of AI in healthcare and the critical role it plays in ensuring patient safety and improved care. Stay tuned!
Resources:
- Watch the entire interview here.
- Check more episodes of this Thought Leadership Series here.
- Connect with and follow Ed Gaudet on LinkedIn and email him here.
- Follow Censinet on LinkedIn and the website.
- Check out the Risk Never Sleeps podcast.
- Connect with and follow Jenny Yu on LinkedIn.
- Learn more about Healthline Media on LinkedIn and their website.
[00:00:02] [SPEAKER_00]: Hello everyone and welcome to the forefront of healthcare innovation in an
[00:00:07] [SPEAKER_00]: era where artificial intelligence reigns supreme. I welcome you to join us on a
[00:00:13] [SPEAKER_00]: journey to uncover its impact in healthcare. This is the Future of AI and
[00:00:18] [SPEAKER_00]: Health podcast series that we're doing in collaboration with Healthline Media
[00:00:22] [SPEAKER_00]: and Outcomes Rocket. I'm your host Saul Marquez and I'll be doing this
[00:00:27] [SPEAKER_00]: series together with the outstanding Dr. Jenny Yu, Chief Health Officer at
[00:00:32] [SPEAKER_00]: Healthline Media. We're excited to give you this series to help you eliminate
[00:00:36] [SPEAKER_00]: the path forward on what AI means to healthcare today and in the future.
[00:00:43] [SPEAKER_00]: Hey everybody welcome back to the Outcomes Rocket on this series on the
[00:00:47] [SPEAKER_00]: Future of AI and Health Care in partnership with Healthline Media. I'm
[00:00:51] [SPEAKER_00]: so excited to be back on the podcast with my co-host Dr. Jenny Yu. Jenny
[00:00:57] [SPEAKER_01]: welcome back to the podcast. Thanks for having me back Saul, good to see you.
[00:01:00] [SPEAKER_00]: Of course it's been a lot of fun co-hosting these with you and we're
[00:01:05] [SPEAKER_00]: on our final interview of this amazing series. So without further ado
[00:01:10] [SPEAKER_00]: I'll go ahead and introduce our guest today. His name is Ed Gaudet. He
[00:01:15] [SPEAKER_00]: is a seasoned CEO and founder with over 25 years of experience in software
[00:01:20] [SPEAKER_00]: specializing in product marketing and sales. He's currently the founder and
[00:01:25] [SPEAKER_00]: CEO of Sensenet, a company focused on the third-party risk and enterprise risk
[00:01:30] [SPEAKER_00]: management. He's a former CMO of Improvada and he's held various
[00:01:34] [SPEAKER_00]: strategic roles as a startup founder as well as in corporate health care and
[00:01:39] [SPEAKER_00]: software. So I'm so pumped to have Ed on the podcast as part of this
[00:01:43] [SPEAKER_03]: Future in AI Health series. Ed welcome. Well thanks for the intro Saul. That was
[00:01:50] [SPEAKER_00]: a pleasure to have you here. And so look I'll go ahead and kick off with the
[00:01:55] [SPEAKER_00]: first question. Talk to us really about your platform and what you guys are
[00:02:01] [SPEAKER_00]: doing. How do you assist hospitals in evaluating cybersecurity readiness of
[00:02:05] [SPEAKER_02]: third-party vendors? Yeah so a few years ago we took a look at how
[00:02:10] [SPEAKER_02]: hospitals, health systems were evaluating cyber risk associated with
[00:02:15] [SPEAKER_02]: not only their internal systems but also their third party ecosystem of
[00:02:18] [SPEAKER_02]: vendors and products. And we found there was an opportunity to really make that
[00:02:24] [SPEAKER_02]: process go a lot smoother through a series of automation and the way we
[00:02:29] [SPEAKER_02]: actually created or constructed the overall platform if you will. And so
[00:02:34] [SPEAKER_02]: we've built what we call today a multi-sided network. Started off as a
[00:02:37] [SPEAKER_02]: two-sided network that directly connects providers and payers with
[00:02:42] [SPEAKER_02]: their ecosystem of third-party vendors and products that they run
[00:02:46] [SPEAKER_02]: through the risk assessment process. And we do that really to enable them to
[00:02:51] [SPEAKER_02]: do more with less on both sides of the network right. It's a pretty big
[00:02:55] [SPEAKER_02]: undertaking to assess risk, security risk. There are a lot of different
[00:02:59] [SPEAKER_02]: frameworks and different types of questions and questionnaires and I
[00:03:02] [SPEAKER_02]: remember when I was at Improvata we would get all different types of
[00:03:06] [SPEAKER_02]: requests from potential customers and they were all different. They were
[00:03:10] [SPEAKER_02]: typically in a spreadsheet or maybe in a Word doc or even PDFs. The
[00:03:14] [SPEAKER_02]: questions would all be you know a range that differed from the type of
[00:03:17] [SPEAKER_02]: question, the semantics of the question, the responses and how we could respond
[00:03:22] [SPEAKER_02]: to them. Sometimes we'd get questions that just were not applicable. Can you
[00:03:26] [SPEAKER_02]: update the firmware? Well we're not really a hardware vendor or a
[00:03:28] [SPEAKER_02]: software vendor right. So these things were obviously not only frustrating
[00:03:32] [SPEAKER_02]: but took time out of the process and ultimately both sides have a set of
[00:03:37] [SPEAKER_02]: objectives right. The provider, the payer they want to ensure that when
[00:03:41] [SPEAKER_02]: they're working with a vendor that obviously the vendor has the right set
[00:03:44] [SPEAKER_02]: of security processes and procedures and controls in place you know to
[00:03:49] [SPEAKER_02]: build that level of trust over that relationship. In addition they want to
[00:03:53] [SPEAKER_02]: ensure that the product also has the level of trust, that level of
[00:03:56] [SPEAKER_02]: controls needed to ensure that the product is deployed properly and being
[00:04:01] [SPEAKER_02]: used properly and doesn't create risk with patient data, with patient
[00:04:05] [SPEAKER_02]: safety. You know we certainly never want a scenario where an attack to a
[00:04:10] [SPEAKER_02]: provider or through a third party provider shuts down a health system.
[00:04:15] [SPEAKER_02]: There's a lot at stake when that happens. So this notion of leverage
[00:04:18] [SPEAKER_02]: and taking time out of that process while adding value, new value became
[00:04:23] [SPEAKER_02]: sort of the design principle and the mantra as we began to work with
[00:04:27] [SPEAKER_02]: customers. So today there's a lot of things that we've added to that
[00:04:31] [SPEAKER_02]: overall process through the automation. You know for example if you have a
[00:04:35] [SPEAKER_02]: a large population of vendors and products it's very hard, very difficult
[00:04:42] [SPEAKER_02]: for that team to get to everybody. To get to all the vendors and all the
[00:04:45] [SPEAKER_02]: different products and so typically they'll artificially bucket them into
[00:04:50] [SPEAKER_02]: critical high-risk buckets but until you actually go through the process
[00:04:54] [SPEAKER_02]: of the assessments really hard to get that correctly. So we enable
[00:04:59] [SPEAKER_02]: organizations through the automation to do as much and conduct as many
[00:05:04] [SPEAKER_02]: assessments as they need basically to run their business correctly.
[00:05:08] [SPEAKER_02]: And so you know not trying to put those or assuming vendors or products
[00:05:13] [SPEAKER_02]: are a certain level of risk without actually capturing the data needed
[00:05:18] [SPEAKER_02]: to make those, you know make the proper analysis. It's so important
[00:05:22] [SPEAKER_02]: and that's only the beginning of the journey you have with that vendor.
[00:05:26] [SPEAKER_02]: Obviously you want to identify risk and you want to be able to detect it
[00:05:30] [SPEAKER_02]: through some regular monitoring tools but you also want to be able to
[00:05:34] [SPEAKER_02]: remediate it. And so by enabling this network of vendors, products and
[00:05:40] [SPEAKER_02]: payers and providers it really enables the reduction of risk across
[00:05:45] [SPEAKER_02]: the network and it really you know this whole notion of all boats
[00:05:49] [SPEAKER_02]: float right if the tide's coming in. Well similarly you know if
[00:05:52] [SPEAKER_02]: everyone is kind of focused on driving down the risk you get this
[00:05:56] [SPEAKER_02]: interesting network effect that you couldn't get if you were doing this
[00:05:59] [SPEAKER_02]: on your own in a pipeline based application.
[00:06:02] [SPEAKER_00]: That's great Ed. No I love the context around it and certainly
[00:06:06] [SPEAKER_00]: the network effect seems to have a big impact and it also I'm thinking
[00:06:11] [SPEAKER_00]: gives you so much more data to work with to allow automation
[00:06:16] [SPEAKER_00]: and models to do what they do to help the people that need this
[00:06:20] [SPEAKER_00]: help understaffed. So I love that. I'll kick it over to Jenny
[00:06:23] [SPEAKER_00]: because the next question really does relate to kind of the data.
[00:06:27] [SPEAKER_01]: Yeah Ed thank you for really setting that up. I know that working
[00:06:30] [SPEAKER_01]: at a health system previously there are large and small vendors
[00:06:34] [SPEAKER_01]: and there's such a complex network of medical devices and revenue
[00:06:38] [SPEAKER_01]: cycle management vendors as well as electronic health records
[00:06:42] [SPEAKER_01]: and such. How do you believe that artificial intelligence machine
[00:06:47] [SPEAKER_01]: learning models can offer and ensure an ongoing monitoring
[00:06:51] [SPEAKER_01]: assessment of these third party risk? And how do you see that
[00:06:54] [SPEAKER_01]: sort of play in the role of automation?
[00:06:55] [SPEAKER_02]: Yeah it's a great question and it's uncharted territory right.
[00:06:59] [SPEAKER_02]: It's new. We're doing a lot with AI at SenseNet as well on
[00:07:02] [SPEAKER_02]: both sides of the network right with vendors and with customers
[00:07:05] [SPEAKER_02]: like providers and payers. And so you know as you think
[00:07:08] [SPEAKER_02]: about the vast surface effectively that AI represents
[00:07:13] [SPEAKER_02]: and presents right. You have the risk obviously to the
[00:07:17] [SPEAKER_02]: organization through the adoption of those technologies
[00:07:21] [SPEAKER_02]: and products etc. And so there's the need to really apply
[00:07:27] [SPEAKER_02]: the right level of scrutiny that may differ from the
[00:07:31] [SPEAKER_02]: approach that you took with a simple cloud based application
[00:07:34] [SPEAKER_02]: or even an on-premise application or a device etc.
[00:07:38] [SPEAKER_02]: So being able to first and foremost assess the level
[00:07:42] [SPEAKER_02]: of risk associated with an AI application maybe that you've
[00:07:47] [SPEAKER_02]: just developed or maybe that you're licensing from an
[00:07:50] [SPEAKER_02]: external party or maybe it's a combination of both right.
[00:07:53] [SPEAKER_02]: That's really important and understanding the threats
[00:07:58] [SPEAKER_02]: associated with AI which are very different than threats
[00:08:01] [SPEAKER_02]: that may be associated with say a non-AI based tool.
[00:08:05] [SPEAKER_02]: And then of course everything's becoming AI enabled.
[00:08:08] [SPEAKER_02]: So you've got this hybrid approach that has to be also
[00:08:12] [SPEAKER_02]: considered when you think about your assessments not
[00:08:15] [SPEAKER_02]: pure AI any longer. Maybe it came in through the
[00:08:18] [SPEAKER_02]: organization based on an upgrade to an existing
[00:08:21] [SPEAKER_02]: application or service that I've been using right.
[00:08:23] [SPEAKER_02]: Or maybe it was a patch that was done. And so now I
[00:08:27] [SPEAKER_02]: have this AI enabled application that I have to
[00:08:30] [SPEAKER_02]: treat differently and assess differently. So there's
[00:08:33] [SPEAKER_02]: that whole set of consideration on the customer
[00:08:36] [SPEAKER_02]: side that has to go into the approach as they think
[00:08:40] [SPEAKER_02]: about AI. Then there's the application of AI as it
[00:08:43] [SPEAKER_02]: relates to cybersecurity as it relates to maybe doing
[00:08:46] [SPEAKER_02]: the security risk assessment process even better even
[00:08:49] [SPEAKER_02]: more accurate. Right. So we believe that you know as we
[00:08:52] [SPEAKER_02]: think about this overall notion of leverage and the
[00:08:56] [SPEAKER_02]: amount of time it takes to get a full assessment done.
[00:08:59] [SPEAKER_02]: Right. The initial leverage we get out of the tool
[00:09:02] [SPEAKER_02]: without AI is taking a process that's 45 days or
[00:09:06] [SPEAKER_02]: greater in length. The first time it's done down
[00:09:08] [SPEAKER_02]: to 10 days or less that's our SLA. So significant
[00:09:11] [SPEAKER_02]: savings right there right out of the gate. The next
[00:09:13] [SPEAKER_02]: time a new provider comes in and assesses that
[00:09:15] [SPEAKER_02]: existing vendor on the platform it's the click of a
[00:09:18] [SPEAKER_02]: button which is really cool right. But what about
[00:09:21] [SPEAKER_02]: new vendors that are coming in even how do we take
[00:09:23] [SPEAKER_02]: that time of 10 days. How do we take that down
[00:09:26] [SPEAKER_02]: and compress it even more. We do that through
[00:09:28] [SPEAKER_02]: AI automation right by we enable AI tools at the
[00:09:32] [SPEAKER_02]: front end of the assessment process for the
[00:09:34] [SPEAKER_02]: vendor so that they can speed up the time it
[00:09:37] [SPEAKER_02]: takes to get those answers that data uploaded
[00:09:40] [SPEAKER_02]: into the system and over to the provider and
[00:09:43] [SPEAKER_02]: the accuracy because now they're using existing
[00:09:47] [SPEAKER_02]: data that they may have already used in the
[00:09:50] [SPEAKER_02]: previous assessment. Right. Leveraging again
[00:09:52] [SPEAKER_02]: that notion of leverage getting leverage out of
[00:09:54] [SPEAKER_02]: the existing work that you did with maybe
[00:09:58] [SPEAKER_02]: three weeks ago you did an assessment for that
[00:10:01] [SPEAKER_02]: was not done in the Sensenet network but was
[00:10:03] [SPEAKER_02]: done out of band. Now you can leverage that
[00:10:06] [SPEAKER_02]: data to complete the Sensenet assessment much
[00:10:09] [SPEAKER_02]: quicker. So compressing that time giving the
[00:10:12] [SPEAKER_02]: tools to the provider to also do speed up the
[00:10:16] [SPEAKER_02]: assessment the analysis the report writing
[00:10:18] [SPEAKER_02]: generation which we do today already but even
[00:10:22] [SPEAKER_02]: bring that down to 30 minutes or less is
[00:10:25] [SPEAKER_02]: really our end goal. It's still co-pilot
[00:10:28] [SPEAKER_02]: it's not an autopilot so you still need
[00:10:31] [SPEAKER_02]: someone and we think this is where AI will
[00:10:33] [SPEAKER_02]: be over the next decade or so. You still
[00:10:35] [SPEAKER_02]: need that you know the interaction with a
[00:10:37] [SPEAKER_02]: person at the other end that is a testing to
[00:10:40] [SPEAKER_02]: data. Yep. I reviewed it. It all looks good or
[00:10:43] [SPEAKER_02]: maybe it looks a little off here. Let me go
[00:10:45] [SPEAKER_02]: back. Oh sure. Yeah that answer was wrong or
[00:10:48] [SPEAKER_02]: that analysis was incorrect so we need to
[00:10:50] [SPEAKER_02]: change that right. It's still a co-pilot and
[00:10:52] [SPEAKER_02]: it should be a co-pilot for a while until
[00:10:54] [SPEAKER_02]: we perfect the data analysis and processing
[00:10:57] [SPEAKER_01]: on the AI side. And that's great to hear
[00:10:59] [SPEAKER_01]: that there's such efficiency being done in
[00:11:01] [SPEAKER_01]: looking at the like you said patterns of
[00:11:04] [SPEAKER_01]: templates. So it's like a rinse and repeat
[00:11:06] [SPEAKER_01]: in terms of using the AI to improve the
[00:11:09] [SPEAKER_01]: efficiency. And I agree that you know the
[00:11:11] [SPEAKER_01]: human in the loop for now makes sense and
[00:11:13] [SPEAKER_01]: even just seeing how AI has come you know
[00:11:16] [SPEAKER_01]: six or nine months ago I'm just sort of
[00:11:18] [SPEAKER_01]: astonished right astonished at the speed
[00:11:21] [SPEAKER_01]: in which this all the adoption is
[00:11:23] [SPEAKER_01]: happening. So yeah great to hear that
[00:11:24] [SPEAKER_01]: that's the work that's being done on the
[00:11:26] [SPEAKER_00]: end as well. Totally agree Jenny and I
[00:11:28] [SPEAKER_00]: mean it sounds like Ed taking people from
[00:11:31] [SPEAKER_00]: spreadsheet inferno to click of a button
[00:11:35] [SPEAKER_00]: with this network of people that just get
[00:11:38] [SPEAKER_00]: smarter and smarter and faster and faster
[00:11:40] [SPEAKER_00]: in your opinion on staying on the AI
[00:11:43] [SPEAKER_00]: topic since that's kind of a series run.
[00:11:45] [SPEAKER_00]: What are the biggest opportunities you see
[00:11:47] [SPEAKER_00]: for AI and health care and are the bad
[00:11:51] [SPEAKER_00]: guys using it against us too. Yeah great
[00:11:54] [SPEAKER_02]: question. So let me start with the
[00:11:55] [SPEAKER_02]: second question. That's an easy answer. Yes
[00:11:57] [SPEAKER_02]: of course they are. They are more
[00:11:59] [SPEAKER_02]: organized better coordinated and
[00:12:01] [SPEAKER_02]: collaborated than they've ever been.
[00:12:04] [SPEAKER_02]: We've seen that even all over the last
[00:12:05] [SPEAKER_02]: couple of years where they've taken this
[00:12:07] [SPEAKER_02]: notion of cyber attacks and they
[00:12:10] [SPEAKER_02]: perfected it and organized it in a way
[00:12:12] [SPEAKER_02]: that they create these micro services
[00:12:14] [SPEAKER_02]: right. So someone creates the attack
[00:12:16] [SPEAKER_02]: someone launches the attack someone goes
[00:12:18] [SPEAKER_02]: and collects and processes the ransom
[00:12:21] [SPEAKER_02]: or the actual money that's being
[00:12:23] [SPEAKER_02]: requested right. And it's never the
[00:12:25] [SPEAKER_02]: same person so they've distributed
[00:12:26] [SPEAKER_02]: those capabilities out in an organized
[00:12:28] [SPEAKER_02]: fashion to be much more effective. And
[00:12:31] [SPEAKER_02]: we've seen the unfortunately we've
[00:12:33] [SPEAKER_02]: seen the results of that across the
[00:12:34] [SPEAKER_02]: industry. But with that being said
[00:12:36] [SPEAKER_02]: technology always presents these
[00:12:38] [SPEAKER_02]: amazing opportunities for industry
[00:12:41] [SPEAKER_02]: right. And so you asked about the
[00:12:42] [SPEAKER_02]: biggest opportunities for AI and
[00:12:44] [SPEAKER_02]: health care. Well first it starts
[00:12:45] [SPEAKER_02]: with the patient better patient care
[00:12:48] [SPEAKER_02]: right. That's always the goal. And
[00:12:50] [SPEAKER_02]: so applying AI to get better
[00:12:52] [SPEAKER_02]: outcomes that's the holy grail. That's
[00:12:54] [SPEAKER_02]: what we want to do is be able to
[00:12:56] [SPEAKER_02]: apply AI in a way that delivers a
[00:12:58] [SPEAKER_02]: better experience a better set of
[00:13:00] [SPEAKER_02]: outcomes for patients in a way that
[00:13:02] [SPEAKER_02]: we can't do today right. So it's you
[00:13:04] [SPEAKER_02]: talk about the future of AI. I always
[00:13:06] [SPEAKER_02]: think about and I always reflect on
[00:13:08] [SPEAKER_02]: how movies or television are
[00:13:11] [SPEAKER_02]: interesting predictor of the future.
[00:13:14] [SPEAKER_02]: So like you know Star Trek I'm sure
[00:13:15] [SPEAKER_02]: you watched Star Trek when you were
[00:13:17] [SPEAKER_02]: younger right. You know their
[00:13:18] [SPEAKER_02]: experience of health care was to go
[00:13:20] [SPEAKER_02]: inside this tube if you will. And
[00:13:22] [SPEAKER_02]: the thing would scan you
[00:13:23] [SPEAKER_02]: automatically and maybe give you a
[00:13:25] [SPEAKER_02]: shot or take blood or so I mean
[00:13:26] [SPEAKER_02]: ultimately we're going to get there.
[00:13:28] [SPEAKER_02]: There'll be a day where in your
[00:13:29] [SPEAKER_02]: house you know use your health care
[00:13:31] [SPEAKER_02]: pod and you know every periodically
[00:13:34] [SPEAKER_02]: you go in you get scanned maybe they
[00:13:36] [SPEAKER_02]: take some blood whatever maybe they
[00:13:38] [SPEAKER_02]: don't even need to take blood anymore.
[00:13:39] [SPEAKER_02]: Here's a better way of doing it right.
[00:13:42] [SPEAKER_02]: And all of your care will be
[00:13:43] [SPEAKER_02]: delivered that way or most of
[00:13:44] [SPEAKER_02]: your care will be delivered that way.
[00:13:46] [SPEAKER_02]: We have Da Vinci for surgical care
[00:13:48] [SPEAKER_02]: today imagine for small surgeries you
[00:13:51] [SPEAKER_02]: could actually do it in that
[00:13:52] [SPEAKER_02]: context of your home in that
[00:13:54] [SPEAKER_02]: tube environment right. I don't know
[00:13:55] [SPEAKER_02]: right but it's going to happen at
[00:13:57] [SPEAKER_02]: some level like this is happening so
[00:13:59] [SPEAKER_02]: fast there will be a day where
[00:14:01] [SPEAKER_02]: literally you know your health
[00:14:03] [SPEAKER_02]: closet or you will your health tube
[00:14:05] [SPEAKER_02]: is where you go to get most of your care.
[00:14:08] [SPEAKER_02]: And with that being said that's kind
[00:14:10] [SPEAKER_02]: of an exciting place to be but it's
[00:14:12] [SPEAKER_02]: also a little scary as well.
[00:14:14] [SPEAKER_02]: And so part and parcel with the
[00:14:16] [SPEAKER_02]: outcomes is the safety aspect of
[00:14:18] [SPEAKER_02]: this right. So we have to have
[00:14:20] [SPEAKER_02]: that balance of better outcomes but
[00:14:23] [SPEAKER_02]: safer patient care right. We've
[00:14:25] [SPEAKER_02]: got to worry about the patient
[00:14:27] [SPEAKER_02]: safety we have to keep that front
[00:14:28] [SPEAKER_02]: and center we can't substitute
[00:14:30] [SPEAKER_02]: outcomes for safety ever right. We
[00:14:32] [SPEAKER_02]: have to consider them always.
[00:14:34] [SPEAKER_02]: And so I think you know those in
[00:14:36] [SPEAKER_02]: a nutshell are the biggest
[00:14:37] [SPEAKER_02]: opportunities. It's better care.
[00:14:39] [SPEAKER_02]: It's better and better safety of
[00:14:41] [SPEAKER_02]: that care over time. And there's
[00:14:44] [SPEAKER_02]: a number of different ways we'll
[00:14:45] [SPEAKER_02]: get there but I think it's an
[00:14:47] [SPEAKER_02]: exciting time to be I think a
[00:14:49] [SPEAKER_02]: little scary but pretty exciting
[00:14:50] [SPEAKER_02]: too at the same time.
[00:14:51] [SPEAKER_00]: Yeah I'll tell you I agree so
[00:14:53] [SPEAKER_00]: much with you. I mean the other
[00:14:55] [SPEAKER_00]: day I was having a talk with the
[00:14:57] [SPEAKER_00]: chief technology officer of sleep
[00:14:58] [SPEAKER_00]: number. What those beds are doing
[00:15:01] [SPEAKER_00]: now they might as well be hospital
[00:15:03] [SPEAKER_00]: beds like so right. Exactly. The
[00:15:07] [SPEAKER_00]: tube is here I think the two
[00:15:09] [SPEAKER_00]: yeah.
[00:15:10] [SPEAKER_01]: What.
[00:15:11] [SPEAKER_01]: He's in it together. When you
[00:15:12] [SPEAKER_01]: were both talking I was having
[00:15:14] [SPEAKER_01]: the Jetson sort of like image in
[00:15:16] [SPEAKER_01]: my head. There's so much remote
[00:15:17] [SPEAKER_01]: patient monitoring there's so
[00:15:19] [SPEAKER_01]: much sort of thinking of care
[00:15:21] [SPEAKER_01]: at home as we move into the
[00:15:23] [SPEAKER_01]: future and we know we cannot
[00:15:24] [SPEAKER_01]: write with technology with
[00:15:26] [SPEAKER_01]: potentially artificial intelligence
[00:15:28] [SPEAKER_01]: and I know that Ed is really
[00:15:30] [SPEAKER_01]: talking about sort of patient
[00:15:31] [SPEAKER_01]: safety and patient outcomes. I
[00:15:33] [SPEAKER_01]: can't help but also think of
[00:15:34] [SPEAKER_01]: patient experience in general
[00:15:36] [SPEAKER_01]: by like I feel like health care
[00:15:38] [SPEAKER_01]: is always a little bit behind
[00:15:39] [SPEAKER_01]: and when you think about the
[00:15:41] [SPEAKER_01]: e-commerce platforms right where
[00:15:43] [SPEAKER_01]: now everything just exists so
[00:15:45] [SPEAKER_01]: seamlessly within an experience
[00:15:47] [SPEAKER_01]: where you know you log on
[00:15:48] [SPEAKER_01]: you can take your credit
[00:15:49] [SPEAKER_01]: card they can do Apple whatever
[00:15:51] [SPEAKER_01]: it may be there's not the
[00:15:53] [SPEAKER_01]: clunkiness of sort of you
[00:15:55] [SPEAKER_01]: know shifting in and out of
[00:15:57] [SPEAKER_01]: platforms or vendors. You know
[00:15:58] [SPEAKER_01]: it's all integrated and there's
[00:16:00] [SPEAKER_01]: interoperability and then
[00:16:01] [SPEAKER_01]: there's an ability for the user
[00:16:03] [SPEAKER_01]: to feel that it's a seamless
[00:16:04] [SPEAKER_01]: experience and I think that's
[00:16:05] [SPEAKER_01]: where health care has to get
[00:16:07] [SPEAKER_01]: to and I'm excited for that
[00:16:08] [SPEAKER_01]: in terms of what you know
[00:16:10] [SPEAKER_01]: automation AI and technology
[00:16:12] [SPEAKER_01]: can do but to get there as
[00:16:14] [SPEAKER_01]: you had mentioned we also
[00:16:16] [SPEAKER_01]: need to then think about sort
[00:16:17] [SPEAKER_01]: of the risks associated with
[00:16:19] [SPEAKER_01]: it and I would love to just
[00:16:20] [SPEAKER_01]: hear some of your success
[00:16:22] [SPEAKER_01]: stories that you can share in
[00:16:23] [SPEAKER_01]: terms of what your platform
[00:16:24] [SPEAKER_01]: has done in terms of helping
[00:16:26] [SPEAKER_01]: whether hospitals providers
[00:16:28] [SPEAKER_01]: you know systems vendors to
[00:16:30] [SPEAKER_01]: mitigate some of this you
[00:16:31] [SPEAKER_01]: should hear you risk because
[00:16:32] [SPEAKER_01]: every day I get an email to
[00:16:34] [SPEAKER_01]: say my data has been breached
[00:16:35] [SPEAKER_01]: somewhere on some sort of
[00:16:37] [SPEAKER_01]: platform. So talk about you
[00:16:38] [SPEAKER_01]: know a little bit just some
[00:16:39] [SPEAKER_01]: of the success stories and how
[00:16:41] [SPEAKER_01]: you see that as the wing for
[00:16:43] [SPEAKER_01]: mitigating risk within
[00:16:44] [SPEAKER_01]: healthcare.
[00:16:45] [SPEAKER_02]: Sure sure so you know it
[00:16:46] [SPEAKER_02]: starts with again the basics
[00:16:48] [SPEAKER_02]: and a lot of the basics are
[00:16:50] [SPEAKER_02]: applicable to AI right so
[00:16:52] [SPEAKER_02]: it's not necessarily new.
[00:16:54] [SPEAKER_02]: I'll point out sort of the
[00:16:55] [SPEAKER_02]: foundational aspects and then
[00:16:56] [SPEAKER_02]: I'll go into sort of what's
[00:16:58] [SPEAKER_02]: new but you know first and
[00:16:59] [SPEAKER_02]: foremost it's really
[00:17:00] [SPEAKER_02]: identifying and understanding
[00:17:02] [SPEAKER_02]: the technical controls that are
[00:17:05] [SPEAKER_02]: in place and that need to be in
[00:17:07] [SPEAKER_02]: place based on the risk profile
[00:17:09] [SPEAKER_02]: of the organization right so
[00:17:10] [SPEAKER_02]: if multi-factor is required
[00:17:12] [SPEAKER_02]: and it's not there then
[00:17:13] [SPEAKER_02]: obviously you want to know
[00:17:15] [SPEAKER_02]: about it and so that's a good
[00:17:16] [SPEAKER_02]: way to see look they don't
[00:17:17] [SPEAKER_02]: have MFA we need MFA so
[00:17:20] [SPEAKER_02]: either they need to add the
[00:17:21] [SPEAKER_02]: vendor needs to add it or we
[00:17:23] [SPEAKER_02]: need to find an alternative
[00:17:24] [SPEAKER_02]: solution.
[00:17:25] [SPEAKER_02]: Similarly if the vendor you
[00:17:28] [SPEAKER_02]: know has support for SSO but
[00:17:30] [SPEAKER_02]: doesn't have support for the
[00:17:31] [SPEAKER_02]: standard that's being used by
[00:17:32] [SPEAKER_02]: the health system again good
[00:17:34] [SPEAKER_02]: to know because we can't use
[00:17:36] [SPEAKER_02]: it we can't adopt it properly
[00:17:38] [SPEAKER_02]: unless we have those controls
[00:17:39] [SPEAKER_02]: in place so then there are
[00:17:41] [SPEAKER_02]: contractual controls
[00:17:42] [SPEAKER_02]: understanding the use of the
[00:17:44] [SPEAKER_02]: data and whether or not it's
[00:17:45] [SPEAKER_02]: protected health information
[00:17:46] [SPEAKER_02]: and if it is then we need a
[00:17:48] [SPEAKER_02]: BAA as a contractual control
[00:17:50] [SPEAKER_02]: also we may need a certain
[00:17:52] [SPEAKER_02]: level of insurance so we need
[00:17:54] [SPEAKER_02]: the certificate of insurance as
[00:17:55] [SPEAKER_02]: well as part of that
[00:17:56] [SPEAKER_02]: assessment process so
[00:17:58] [SPEAKER_02]: it's not just the answers to
[00:17:59] [SPEAKER_02]: the questionnaire but it's
[00:18:00] [SPEAKER_02]: also supporting evidence to be
[00:18:03] [SPEAKER_02]: used in that assessment
[00:18:04] [SPEAKER_02]: process and then based on the
[00:18:06] [SPEAKER_02]: tiering of the vendor whether
[00:18:07] [SPEAKER_02]: it's a critical to our overall
[00:18:09] [SPEAKER_02]: organization based on a
[00:18:11] [SPEAKER_02]: business impact analysis and
[00:18:13] [SPEAKER_02]: understanding of how that
[00:18:14] [SPEAKER_02]: works within the
[00:18:15] [SPEAKER_02]: organization what business
[00:18:16] [SPEAKER_02]: process it affects right.
[00:18:19] [SPEAKER_02]: Then we may want to do a
[00:18:20] [SPEAKER_02]: reassessment annually versus
[00:18:23] [SPEAKER_02]: every two years or maybe even
[00:18:25] [SPEAKER_02]: more frequent having that
[00:18:27] [SPEAKER_02]: automated as part of the
[00:18:28] [SPEAKER_02]: platform is really important.
[00:18:29] [SPEAKER_02]: Now that happens regardless of
[00:18:32] [SPEAKER_02]: whether you're an AI enabled
[00:18:34] [SPEAKER_02]: solution or not with an AI
[00:18:37] [SPEAKER_02]: there are aspects of risk
[00:18:39] [SPEAKER_02]: that are different and so
[00:18:40] [SPEAKER_02]: you want to also include
[00:18:42] [SPEAKER_02]: those aspects in your overall
[00:18:44] [SPEAKER_02]: risk management process and
[00:18:46] [SPEAKER_02]: you want to think about it
[00:18:47] [SPEAKER_02]: not just with your third
[00:18:49] [SPEAKER_02]: parties but you want to think
[00:18:50] [SPEAKER_02]: about it as part of your
[00:18:52] [SPEAKER_02]: enterprise risk as well.
[00:18:53] [SPEAKER_02]: So one thing that we've done
[00:18:56] [SPEAKER_02]: recently is we've added the
[00:18:57] [SPEAKER_02]: NIST based AI RRMF assessment
[00:19:00] [SPEAKER_02]: into our product.
[00:19:01] [SPEAKER_02]: So now a provider can look at
[00:19:04] [SPEAKER_02]: their own organization their
[00:19:05] [SPEAKER_02]: own controls and their own
[00:19:07] [SPEAKER_02]: process and procedures and
[00:19:08] [SPEAKER_02]: policies relative to how
[00:19:10] [SPEAKER_02]: they're adopting AI within
[00:19:12] [SPEAKER_02]: the organization itself.
[00:19:14] [SPEAKER_02]: Similarly we have AI questions
[00:19:18] [SPEAKER_02]: within each what we call
[00:19:19] [SPEAKER_02]: product type so if you're a
[00:19:20] [SPEAKER_02]: cloud application or your
[00:19:22] [SPEAKER_02]: hardware device or your a
[00:19:24] [SPEAKER_02]: medical device or your some
[00:19:25] [SPEAKER_02]: IoT device maybe you're
[00:19:27] [SPEAKER_02]: consulting in applying services
[00:19:29] [SPEAKER_02]: based on AI.
[00:19:31] [SPEAKER_02]: We want to make sure that we
[00:19:32] [SPEAKER_02]: capture those in the overall
[00:19:34] [SPEAKER_02]: assessment process as well so
[00:19:36] [SPEAKER_02]: adding questionnaires specific
[00:19:38] [SPEAKER_02]: to the approach the types of
[00:19:40] [SPEAKER_02]: risks that could and threats
[00:19:42] [SPEAKER_02]: that could be available based
[00:19:43] [SPEAKER_02]: on the introduction of the
[00:19:45] [SPEAKER_02]: technology or the service by
[00:19:47] [SPEAKER_02]: the third party and looking
[00:19:48] [SPEAKER_02]: at the internal organization
[00:19:51] [SPEAKER_02]: process procedures controls
[00:19:52] [SPEAKER_02]: resources as it applies to
[00:19:54] [SPEAKER_02]: their management of AI.
[00:19:57] [SPEAKER_02]: Does that make sense?
[00:19:58] [SPEAKER_02]: Yeah.
[00:19:58] [SPEAKER_02]: Okay good.
[00:19:59] [SPEAKER_02]: And then you know there's some
[00:20:01] [SPEAKER_02]: really good things to look at
[00:20:02] [SPEAKER_02]: Sandy Dunn who is focuses in
[00:20:05] [SPEAKER_02]: AI she published recently an
[00:20:07] [SPEAKER_02]: AI threat map that identifies
[00:20:09] [SPEAKER_02]: seven threats so again these
[00:20:11] [SPEAKER_02]: are different threats than you
[00:20:12] [SPEAKER_02]: would get maybe from another
[00:20:13] [SPEAKER_02]: type of technology but there's
[00:20:14] [SPEAKER_02]: threats from the AI model
[00:20:15] [SPEAKER_02]: itself.
[00:20:16] [SPEAKER_02]: There's threats when using
[00:20:17] [SPEAKER_02]: the AI model.
[00:20:19] [SPEAKER_02]: There's threats that can
[00:20:20] [SPEAKER_02]: happen to the AI model
[00:20:22] [SPEAKER_02]: right.
[00:20:22] [SPEAKER_02]: These are all different.
[00:20:23] [SPEAKER_02]: There's legal and regulatory
[00:20:25] [SPEAKER_02]: threats.
[00:20:26] [SPEAKER_02]: There is the dependency threat
[00:20:28] [SPEAKER_02]: what happens when you become
[00:20:29] [SPEAKER_02]: too dependent on AI.
[00:20:31] [SPEAKER_02]: What's the threat to the
[00:20:32] [SPEAKER_02]: organization.
[00:20:33] [SPEAKER_02]: What happens if you don't use
[00:20:34] [SPEAKER_02]: it.
[00:20:35] [SPEAKER_02]: So what are the competitive
[00:20:36] [SPEAKER_02]: threats right if you're
[00:20:37] [SPEAKER_02]: actually not applying AI to
[00:20:39] [SPEAKER_02]: your business or if you
[00:20:41] [SPEAKER_02]: don't understand the actual
[00:20:43] [SPEAKER_02]: models that you've deployed
[00:20:44] [SPEAKER_02]: how can you tune
[00:20:46] [SPEAKER_02]: appropriately if you don't
[00:20:47] [SPEAKER_02]: understand the model.
[00:20:48] [SPEAKER_02]: So so that represents seven
[00:20:50] [SPEAKER_02]: threats I'm sure will go
[00:20:52] [SPEAKER_02]: you know another six months and
[00:20:53] [SPEAKER_02]: we'll have 10 more threats
[00:20:55] [SPEAKER_02]: that will identify right.
[00:20:56] [SPEAKER_02]: So this is a rapidly evolving
[00:20:58] [SPEAKER_02]: and changing obviously
[00:20:59] [SPEAKER_02]: technology type and threat
[00:21:01] [SPEAKER_02]: landscape as it relates to AI
[00:21:03] [SPEAKER_02]: but we're learning a lot
[00:21:04] [SPEAKER_02]: which is good.
[00:21:05] [SPEAKER_02]: There's a lot of heat and
[00:21:06] [SPEAKER_02]: light on this and energy on
[00:21:08] [SPEAKER_02]: really understanding the
[00:21:09] [SPEAKER_02]: risks associated with AI.
[00:21:10] [SPEAKER_02]: And again it starts with
[00:21:13] [SPEAKER_02]: good governance so you have
[00:21:15] [SPEAKER_02]: to have a strong governance
[00:21:17] [SPEAKER_02]: approach to this.
[00:21:19] [SPEAKER_02]: So independent of the
[00:21:21] [SPEAKER_02]: assessments and types of
[00:21:23] [SPEAKER_02]: technical assessments you do
[00:21:24] [SPEAKER_02]: the type of organizational
[00:21:25] [SPEAKER_02]: assessments you do whether
[00:21:27] [SPEAKER_02]: they be for a third party
[00:21:28] [SPEAKER_02]: or for your own internal
[00:21:29] [SPEAKER_02]: organization.
[00:21:30] [SPEAKER_02]: You also have to think about
[00:21:31] [SPEAKER_02]: governance differently as
[00:21:33] [SPEAKER_02]: well.
[00:21:33] [SPEAKER_00]: I love it.
[00:21:34] [SPEAKER_00]: Yeah.
[00:21:35] [SPEAKER_00]: A lot to think about there
[00:21:36] [SPEAKER_00]: Ed and great question
[00:21:38] [SPEAKER_00]: Jenny for everybody
[00:21:40] [SPEAKER_00]: listening.
[00:21:41] [SPEAKER_00]: You're probably working with
[00:21:42] [SPEAKER_00]: this.
[00:21:43] [SPEAKER_00]: You're dealing with this.
[00:21:44] [SPEAKER_00]: You're thinking about this.
[00:21:45] [SPEAKER_00]: We do this these types of
[00:21:47] [SPEAKER_00]: shows so that you could get
[00:21:48] [SPEAKER_00]: the tip of the spear on
[00:21:50] [SPEAKER_00]: people working on AI
[00:21:53] [SPEAKER_00]: cybersecurity.
[00:21:55] [SPEAKER_00]: So definitely make sure you
[00:21:56] [SPEAKER_00]: check out the show notes
[00:21:56] [SPEAKER_00]: after we're done.
[00:21:57] [SPEAKER_00]: You'll have links to
[00:21:58] [SPEAKER_00]: SenseNet and our entire
[00:22:00] [SPEAKER_00]: series there.
[00:22:01] [SPEAKER_00]: So make sure you take
[00:22:02] [SPEAKER_00]: advantage of working with
[00:22:04] [SPEAKER_00]: the experts.
[00:22:05] [SPEAKER_00]: Ed what tips or advice as
[00:22:06] [SPEAKER_00]: we close out this interview
[00:22:07] [SPEAKER_00]: today would you give to
[00:22:09] [SPEAKER_00]: health leaders listening and
[00:22:11] [SPEAKER_00]: watching on the adoption
[00:22:12] [SPEAKER_00]: of AI.
[00:22:13] [SPEAKER_02]: Sure.
[00:22:14] [SPEAKER_02]: Well first and foremost if
[00:22:15] [SPEAKER_02]: you're just starting to
[00:22:16] [SPEAKER_02]: think about AI you're
[00:22:18] [SPEAKER_02]: already behind.
[00:22:19] [SPEAKER_02]: So there are risks within
[00:22:21] [SPEAKER_02]: your organization that you
[00:22:22] [SPEAKER_02]: don't even know about your
[00:22:23] [SPEAKER_02]: customers the people that
[00:22:25] [SPEAKER_02]: are using your technology
[00:22:26] [SPEAKER_02]: to do their jobs.
[00:22:28] [SPEAKER_02]: They're adopting AI.
[00:22:30] [SPEAKER_02]: It's happening today whether
[00:22:31] [SPEAKER_02]: you know it or not.
[00:22:32] [SPEAKER_02]: So start again with that
[00:22:33] [SPEAKER_02]: governance process instead
[00:22:35] [SPEAKER_02]: of policies to make it
[00:22:37] [SPEAKER_02]: very clear where they can
[00:22:39] [SPEAKER_02]: use AI and where they
[00:22:40] [SPEAKER_02]: can't use AI.
[00:22:41] [SPEAKER_02]: And it's remember it's not
[00:22:43] [SPEAKER_02]: just about new products.
[00:22:44] [SPEAKER_02]: Obviously it's easier to
[00:22:46] [SPEAKER_02]: look at it from the
[00:22:47] [SPEAKER_02]: context of a new product
[00:22:48] [SPEAKER_02]: coming in.
[00:22:49] [SPEAKER_02]: You also have to look at
[00:22:50] [SPEAKER_02]: it through those upgrades
[00:22:51] [SPEAKER_02]: and patches with existing
[00:22:53] [SPEAKER_02]: products and services as
[00:22:55] [SPEAKER_02]: well.
[00:22:55] [SPEAKER_02]: So that's another vector of
[00:22:57] [SPEAKER_02]: risk that you may or not
[00:22:58] [SPEAKER_02]: be thinking about even if
[00:22:59] [SPEAKER_02]: you already have a
[00:23:00] [SPEAKER_02]: governance process in
[00:23:01] [SPEAKER_02]: place for the adoption
[00:23:03] [SPEAKER_02]: of new technology where
[00:23:05] [SPEAKER_02]: there may be AI right.
[00:23:06] [SPEAKER_02]: So it's coming from all
[00:23:08] [SPEAKER_02]: unfortunately the surface
[00:23:10] [SPEAKER_02]: has gotten so much
[00:23:12] [SPEAKER_02]: larger from a risk
[00:23:13] [SPEAKER_02]: perspective now that with
[00:23:14] [SPEAKER_02]: the introduction of AI
[00:23:15] [SPEAKER_02]: because it's the threat
[00:23:17] [SPEAKER_02]: of existing products
[00:23:18] [SPEAKER_02]: and services.
[00:23:19] [SPEAKER_02]: It's the threat of new
[00:23:20] [SPEAKER_02]: products and services
[00:23:21] [SPEAKER_02]: and then it's a threat of
[00:23:23] [SPEAKER_02]: external products
[00:23:24] [SPEAKER_02]: and services that your
[00:23:26] [SPEAKER_02]: users are introducing
[00:23:27] [SPEAKER_02]: whether you know it
[00:23:28] [SPEAKER_02]: or not through their
[00:23:29] [SPEAKER_02]: own personal phones
[00:23:30] [SPEAKER_02]: or their own personal
[00:23:32] [SPEAKER_02]: devices.
[00:23:33] [SPEAKER_00]: Wow.
[00:23:34] [SPEAKER_00]: Yeah.
[00:23:34] [SPEAKER_00]: Go ahead Jenny.
[00:23:35] [SPEAKER_01]: Well I was going to say
[00:23:36] [SPEAKER_01]: some of the existing
[00:23:37] [SPEAKER_01]: vendors you can already
[00:23:38] [SPEAKER_01]: see that there's AI
[00:23:40] [SPEAKER_01]: enablement with those
[00:23:41] [SPEAKER_01]: existing vendors and
[00:23:42] [SPEAKER_01]: that as Ed was talking
[00:23:43] [SPEAKER_01]: sometimes it just feels
[00:23:44] [SPEAKER_01]: like you know even if
[00:23:46] [SPEAKER_01]: you have governance
[00:23:46] [SPEAKER_01]: in place you're not
[00:23:47] [SPEAKER_01]: going to sort of capture
[00:23:49] [SPEAKER_01]: all of the potential
[00:23:50] [SPEAKER_01]: risks whether someone's
[00:23:51] [SPEAKER_01]: using on their personal
[00:23:52] [SPEAKER_01]: phone and whatnot.
[00:23:54] [SPEAKER_01]: And so it sounds like
[00:23:55] [SPEAKER_01]: you know we just have
[00:23:55] [SPEAKER_01]: to be continuously
[00:23:57] [SPEAKER_01]: sort of thinking about
[00:23:58] [SPEAKER_01]: the risk monitoring
[00:23:59] [SPEAKER_01]: the risk and then
[00:24:00] [SPEAKER_01]: using expertise such
[00:24:01] [SPEAKER_01]: and others out there
[00:24:03] [SPEAKER_01]: because with health
[00:24:04] [SPEAKER_01]: care it just feels
[00:24:05] [SPEAKER_01]: like we are at the
[00:24:07] [SPEAKER_01]: sort of tip of the
[00:24:08] [SPEAKER_01]: sphere in terms of
[00:24:09] [SPEAKER_01]: what's going to happen
[00:24:10] [SPEAKER_01]: with all the data
[00:24:11] [SPEAKER_01]: and then what's going
[00:24:12] [SPEAKER_01]: to happen with all
[00:24:13] [SPEAKER_01]: this technology and
[00:24:14] [SPEAKER_01]: it's moving faster
[00:24:15] [SPEAKER_01]: than I think the
[00:24:16] [SPEAKER_01]: regulations can even
[00:24:17] [SPEAKER_01]: you know be set in place
[00:24:19] [SPEAKER_01]: and so very interesting
[00:24:21] [SPEAKER_01]: kind of dichotomy of
[00:24:22] [SPEAKER_01]: world that we live in now.
[00:24:24] [SPEAKER_00]: Yeah I totally agree
[00:24:25] [SPEAKER_00]: with Jenny there's a
[00:24:26] [SPEAKER_00]: lot for us to think
[00:24:27] [SPEAKER_00]: about here and reflect on
[00:24:29] [SPEAKER_00]: so definitely let's
[00:24:31] [SPEAKER_00]: take advantage of our
[00:24:32] [SPEAKER_00]: time together with
[00:24:33] [SPEAKER_00]: Ed to really give
[00:24:34] [SPEAKER_00]: it some serious thought
[00:24:35] [SPEAKER_00]: are you doing what
[00:24:36] [SPEAKER_00]: you should be doing
[00:24:37] [SPEAKER_00]: can you be doing better
[00:24:38] [SPEAKER_00]: Ed on that note
[00:24:40] [SPEAKER_00]: for the people that
[00:24:41] [SPEAKER_00]: want to reach out
[00:24:42] [SPEAKER_00]: learn more about what
[00:24:43] [SPEAKER_00]: you and your team
[00:24:44] [SPEAKER_00]: are doing and also
[00:24:45] [SPEAKER_00]: by the way I've been
[00:24:46] [SPEAKER_00]: following your podcast
[00:24:48] [SPEAKER_00]: risk never sleep so
[00:24:49] [SPEAKER_00]: let's give you an
[00:24:50] [SPEAKER_00]: opportunity to plug
[00:24:51] [SPEAKER_00]: that and then share
[00:24:52] [SPEAKER_00]: with the listeners
[00:24:52] [SPEAKER_00]: best way that they
[00:24:54] [SPEAKER_00]: can get in touch.
[00:24:55] [SPEAKER_03]: Yeah it's a lot to
[00:24:55] [SPEAKER_03]: impact so best way
[00:24:57] [SPEAKER_02]: to get in touch
[00:24:57] [SPEAKER_02]: you can always send
[00:24:58] [SPEAKER_02]: me an email E.
[00:24:59] [SPEAKER_02]: Goden E.
[00:25:00] [SPEAKER_02]: G.
[00:25:00] [SPEAKER_02]: A.
[00:25:00] [SPEAKER_02]: U.
[00:25:01] [SPEAKER_02]: D.
[00:25:01] [SPEAKER_02]: E.
[00:25:01] [SPEAKER_02]: T.
[00:25:01] [SPEAKER_02]: At Censin at C.
[00:25:02] [SPEAKER_02]: E.
[00:25:03] [SPEAKER_02]: N.
[00:25:03] [SPEAKER_02]: S.
[00:25:03] [SPEAKER_02]: I.
[00:25:04] [SPEAKER_02]: N.
[00:25:04] [SPEAKER_02]: E.
[00:25:04] [SPEAKER_02]: T.
[00:25:04] [SPEAKER_02]: Dot com you can
[00:25:06] [SPEAKER_02]: check out our website
[00:25:07] [SPEAKER_02]: www dot
[00:25:08] [SPEAKER_02]: censored dot com
[00:25:09] [SPEAKER_02]: our podcasts are
[00:25:10] [SPEAKER_02]: available on all of
[00:25:12] [SPEAKER_02]: the major podcast
[00:25:13] [SPEAKER_02]: platforms Spotify
[00:25:14] [SPEAKER_02]: Apple etc.
[00:25:15] [SPEAKER_02]: And I think we're
[00:25:17] [SPEAKER_02]: approaching 90
[00:25:18] [SPEAKER_02]: episodes which is
[00:25:19] [SPEAKER_02]: kind of amazing
[00:25:19] [SPEAKER_02]: I just started this
[00:25:20] [SPEAKER_02]: thing last year so
[00:25:22] [SPEAKER_02]: it just blows my mind
[00:25:23] [SPEAKER_02]: that we're almost at
[00:25:24] [SPEAKER_02]: 100 and we
[00:25:25] [SPEAKER_02]: you know we're very
[00:25:26] [SPEAKER_02]: blessed to have
[00:25:26] [SPEAKER_02]: really the interesting
[00:25:27] [SPEAKER_02]: the cream of the
[00:25:28] [SPEAKER_02]: crop when it comes
[00:25:29] [SPEAKER_02]: to health care
[00:25:30] [SPEAKER_02]: and leaders
[00:25:31] [SPEAKER_02]: that are been out
[00:25:32] [SPEAKER_02]: there they're on
[00:25:33] [SPEAKER_02]: the front lines
[00:25:33] [SPEAKER_02]: are protecting
[00:25:34] [SPEAKER_02]: patient safety
[00:25:35] [SPEAKER_02]: and patient care
[00:25:36] [SPEAKER_02]: delivery so
[00:25:37] [SPEAKER_02]: it's really great
[00:25:38] [SPEAKER_02]: to just be able
[00:25:38] [SPEAKER_02]: to hear the
[00:25:39] [SPEAKER_02]: insight from
[00:25:40] [SPEAKER_02]: several different
[00:25:40] [SPEAKER_02]: perspectives on
[00:25:41] [SPEAKER_02]: not just a I
[00:25:43] [SPEAKER_02]: but just all
[00:25:43] [SPEAKER_02]: facets of cyber
[00:25:44] [SPEAKER_02]: security and I.T.
[00:25:46] [SPEAKER_02]: and patient care
[00:25:47] [SPEAKER_02]: and what was the
[00:25:47] [SPEAKER_02]: other question
[00:25:48] [SPEAKER_02]: you had I
[00:25:48] [SPEAKER_02]: forgot best
[00:25:49] [SPEAKER_00]: place to get
[00:25:50] [SPEAKER_00]: in touch with
[00:25:50] [SPEAKER_00]: you so they
[00:25:51] [SPEAKER_00]: yeah I give you
[00:25:51] [SPEAKER_02]: the best this
[00:25:52] [SPEAKER_02]: place yeah
[00:25:53] [SPEAKER_02]: but also I guess
[00:25:54] [SPEAKER_02]: last thing I'd add
[00:25:55] [SPEAKER_02]: is get involved
[00:25:56] [SPEAKER_02]: there's so many
[00:25:57] [SPEAKER_02]: different associations
[00:25:58] [SPEAKER_02]: and organizations
[00:25:59] [SPEAKER_02]: you can get
[00:26:00] [SPEAKER_02]: involved with if
[00:26:00] [SPEAKER_02]: you're in health
[00:26:01] [SPEAKER_02]: care there's
[00:26:02] [SPEAKER_02]: the health care
[00:26:03] [SPEAKER_02]: sector or health
[00:26:04] [SPEAKER_02]: industry
[00:26:05] [SPEAKER_02]: sector coordinating
[00:26:06] [SPEAKER_02]: council H.S.C.C.
[00:26:08] [SPEAKER_02]: that is a lot
[00:26:09] [SPEAKER_02]: of activity a lot
[00:26:10] [SPEAKER_02]: of information about
[00:26:11] [SPEAKER_02]: A.I. but other
[00:26:11] [SPEAKER_02]: aspects of cyber
[00:26:13] [SPEAKER_02]: security strategies
[00:26:14] [SPEAKER_02]: and programs
[00:26:15] [SPEAKER_02]: and technologies
[00:26:16] [SPEAKER_02]: on their website.
[00:26:18] [SPEAKER_02]: You can also
[00:26:18] [SPEAKER_02]: reach out to the
[00:26:19] [SPEAKER_02]: HHS and look
[00:26:20] [SPEAKER_02]: at to the four
[00:26:21] [SPEAKER_02]: or five D.
[00:26:23] [SPEAKER_02]: Which does
[00:26:23] [SPEAKER_02]: the health industry
[00:26:24] [SPEAKER_02]: cyber security
[00:26:25] [SPEAKER_02]: practices.
[00:26:26] [SPEAKER_02]: Also they're
[00:26:27] [SPEAKER_02]: involved with
[00:26:27] [SPEAKER_02]: the cyber
[00:26:28] [SPEAKER_02]: security performance
[00:26:29] [SPEAKER_02]: goals which have
[00:26:29] [SPEAKER_02]: been recently
[00:26:30] [SPEAKER_02]: announced.
[00:26:31] [SPEAKER_02]: So there's a lot
[00:26:31] [SPEAKER_02]: happening on the
[00:26:32] [SPEAKER_02]: health and cyber
[00:26:33] [SPEAKER_02]: security and risk
[00:26:35] [SPEAKER_02]: front and plenty
[00:26:36] [SPEAKER_02]: of opportunity
[00:26:37] [SPEAKER_02]: to get involved.
[00:26:37] [SPEAKER_02]: And if you
[00:26:39] [SPEAKER_02]: want more
[00:26:39] [SPEAKER_02]: insight into that
[00:26:40] [SPEAKER_02]: again reach
[00:26:41] [SPEAKER_02]: out to me directly.
[00:26:42] [SPEAKER_00]: Love it Ed.
[00:26:43] [SPEAKER_00]: Such great
[00:26:43] [SPEAKER_00]: shares there.
[00:26:45] [SPEAKER_00]: Want to thank you
[00:26:45] [SPEAKER_00]: for participating
[00:26:46] [SPEAKER_00]: in today's
[00:26:47] [SPEAKER_00]: podcast
[00:26:47] [SPEAKER_00]: and listeners
[00:26:48] [SPEAKER_00]: thanks for joining
[00:26:49] [SPEAKER_00]: us viewing us.
[00:26:51] [SPEAKER_00]: This has been a fun
[00:26:52] [SPEAKER_00]: series.
[00:26:52] [SPEAKER_00]: Jenny you want to
[00:26:53] [SPEAKER_00]: wrap us up.
[00:26:54] [SPEAKER_01]: Yeah this has
[00:26:55] [SPEAKER_01]: been a fun series
[00:26:56] [SPEAKER_01]: and Ed thank you
[00:26:56] [SPEAKER_01]: for being our final
[00:26:58] [SPEAKER_01]: guest for the
[00:26:59] [SPEAKER_01]: series to
[00:26:59] [SPEAKER_01]: listeners. Thanks
[00:27:00] [SPEAKER_01]: for being with
[00:27:01] [SPEAKER_01]: us and remember
[00:27:02] [SPEAKER_01]: to check out their
[00:27:02] [SPEAKER_01]: show notes
[00:27:03] [SPEAKER_01]: and for key
[00:27:04] [SPEAKER_01]: takeaways
[00:27:04] [SPEAKER_01]: and the links
[00:27:05] [SPEAKER_01]: to the resources
[00:27:06] [SPEAKER_01]: that was mentioned
[00:27:07] [SPEAKER_01]: on today's
[00:27:07] [SPEAKER_01]: podcast.
[00:27:08] [SPEAKER_01]: Thanks again
[00:27:09] [SPEAKER_01]: and we'll see
[00:27:09] [SPEAKER_01]: you all soon.
[00:27:11] [SPEAKER_00]: Thanks for listening
[00:27:12] [SPEAKER_00]: to our series
[00:27:13] [SPEAKER_00]: Future of AI in Health
[00:27:15] [SPEAKER_00]: our collaboration
[00:27:16] [SPEAKER_00]: with Healthline Media
[00:27:17] [SPEAKER_00]: as we conclude
[00:27:18] [SPEAKER_00]: this episode
[00:27:19] [SPEAKER_00]: we invite you
[00:27:20] [SPEAKER_00]: to stay tuned
[00:27:21] [SPEAKER_00]: for more
[00:27:21] [SPEAKER_00]: insightful discussions
[00:27:22] [SPEAKER_00]: on the series
[00:27:23] [SPEAKER_00]: that we're
[00:27:24] [SPEAKER_00]: doing together.
[00:27:25] [SPEAKER_00]: The future is now
[00:27:26] [SPEAKER_00]: and with knowledge
[00:27:27] [SPEAKER_00]: comes empowerment.
[00:27:28] [SPEAKER_00]: So I want to thank
[00:27:29] [SPEAKER_00]: you for joining us
[00:27:30] [SPEAKER_00]: and looking
[00:27:31] [SPEAKER_00]: forward to having
[00:27:31] [SPEAKER_00]: you with us
[00:27:32] [SPEAKER_00]: on the next time
[00:27:33] [SPEAKER_00]: as we explore
[00:27:34] [SPEAKER_00]: the impact of
[00:27:35] [SPEAKER_00]: AI in healthcare
[00:27:36] [SPEAKER_00]: today
[00:27:37] [SPEAKER_00]: and in the future.

