Security breaches in health care organizations have been on a steady rise over the past three years with electronic protected health information (ePHI) being a prime target. That’s a critical issue for health insurance providers, who make exceptionally attractive targets to cybercriminals because of ePHI embedded in claims data. As attacks continue to rise in both frequency and strength, these organizations face the risk of a large-scale data breach potentially involving the social security numbers and payment details of millions of patients—along with the risk of additional theft or fraud, costly downtime, and significant financial penalties.
In order to protect the ePHI data, health insurance organizations must have a solution that is fast, verifiable, repeatable, and secure.
Chief Technologist, Healthcare North America
Atif Chaughtai is the Chief Technologist of Healthcare NA at Red Hat. He brings over 18 years of experience in information technology with a focus on Healthcare and Life Sciences. At Red Hat, Chaughtai helps customers align with the Red Hat portfolio, while serving as a champion for emerging requirement and feedback needs through the product and engineering team. He is active participant on various Healthcare and Life Sciences standards committees.
Prior to joining Red Hat, Chaughtai worked at the National Institutes of Health (NIH) as an Enterprise Architect where he was tasked with solving some of the most critical challenges faced by the agency. He worked on streamlining clinical research programs while ensuring HIPAA compliance and was recognized multiple times for his contribution to the NIH’s mission.
Chief Security Strategist
Shawn Wells is the Chief Security Strategist for Red Hat’s Public Sector organization, where he works on improving the process of adopting, contributing to and managing open source security technologies within the US Government. Prior to this role Wells was the Technical Director for US Intelligence Programs, where he oversaw Red Hat’s technical partnerships with agencies such as the NSA, CIA and NRO. In the OpenStack realm, Wells co-authored the OpenStack Security Guide published through the OpenStack Foundation. This book covered lessons learned from deployments across industry and the US Government, such as MACHINESHOP at the NSA. Additionally, he worked as the Solution Architect for OpenStack implementations at the NRO, Lockheed Martin and Johns Hopkins Applied Physics Laboratory.