Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue.

Use This Form to Check Your Eligibility

CPE-LHCRM-Checkmark.pngTo gain the most value from this educational experience, it is important that you have prior healthcare-related experience. The teaching team asks that prospective learners complete a pre-registration form before being approved to enroll in the program or any of the individual courses.

Return to the Leadership in Healthcare Cyber Risk Management program page.
 

Who Should Enroll

Experienced healthcare professionals from a variety of healthcare or healthcare-related settings who want to enhance their careers, including:

  • Clinical professionals,
  • Healthcare administrators,
  • Information Technology professionals, including Cybersecurity,
  • Emergency preparedness professionals,
  • Risk managers, and
  • Other healthcare professionals.

Basic Requirements for Approval to Register

  • You should be currently employed in a healthcare-related field. This program is not designed for those looking to enter the healthcare field.
  • You should have at least two years of U.S. healthcare-related experience and a college degree, or five years of U.S. healthcare-related experience without a college degree.

Approval Process

After completing this form, you will receive a confirmation email verifying that we received your submission. Your details will be reviewed by our faculty. If you meet program eligibility minimum requirements, you will be contacted via email with your registration approval and instructions for completing your enrollment.

If you are not found to be eligible for the program at this time, you will receive an email notification with that decision and additional information.

Registration Approval Request 

Upcoming Courses

To ensure that you are able to join upcoming courses, you should submit the registration approval request (above) at least three weeks prior to the course start date.

Once you are notified that you have been approved to register, you must submit a Registration Form and payment at least two weeks prior to the course start date.



Course Name

Start Date

Identify Cyber Risks: Healthcare Enterprise Cyber Risk Management

4/7/2025

Leverage Healthcare Policy: How Policy Impacts Healthcare

5/12/2025

Manage Identity: Identity and Access Management (IAM)

6/16/2025

Recover: Business Continuity Planning and Disaster Recovery

7/21/2025

Detect and Respond to Threats: Ransomware and Extortion

9/1/2025

Protect the Internet of Medical Things (IoMT): Medical Device Security

10/6/2025


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purust risus nec bibendum.

Additional Information

For each four-week course, learners will complete three weeks of asynchronous instruction, and in the fourth week they will have the culminating opportunity to engage in live, online, strategic conversations with subject matter experts. To highlight professional achievements in each course, learners will complete a competency-based ePortfolio that they can share with their current leadership or future employers.

Learners in all courses will be provided with Cross-Cutting, All-Program Resources that will allow them to explore current healthcare cybersecurity topics such as the impact of cyber-attacks on patient safety, artificial intelligence, and more. In addition to resources provided outside of class, all learners will receive a complimentary copy of Enterprise Risk Management as a Value Creator by Mr. Bob Chaput, an instructor in the program.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Key Learning Outcomes

Who Should Enroll

  • Experienced healthcare professionals from a variety of healthcare or healthcare-related settings who want to enhance their careers, including:
    • Clinical professionals,
    • Healthcare administrators,
    • Information Technology professionals, including Cybersecurity,
    • Emergency preparedness professionals,
    • Risk managers, and
    • Other healthcare professionals.
  • Those with at least two years of U.S. healthcare-related experience with a college degree, or five years of U.S. healthcare-related experience without a college degree.
  • Individuals currently employed in a healthcare related field. This program is not designed for those looking to enter the healthcare field or who do not have the above listed experience.

What You Will Learn

  • Strategic concepts underlying foundational enterprise risk management (ERM) and enterprise cyber risk management (ECRM).
  • How to conduct a comprehensive, enterprise-wide risk analysis using the industry-leading software-as-a-service tool, IRM|Analysis®.
  • How to understand and navigate current healthcare policies, security and privacy regulations, and laws that shape the operations of healthcare organizations. Learn what healthcare leaders need to know and do to protect sensitive patient information and comply with state and federal standards.
  • Essential knowledge needed to implement Identity and Access Management (IAM) protocols and procedures with controls within healthcare organizations.
  • How to develop Business Continuity Planning and Disaster Recovery documentation and procedures within your healthcare organization.
  • An understanding of current cybersecurity threats, including how to effectively detect and respond to ransomware and extortion attacks on healthcare organizations.
  • Knowledge and practical application to protect the Internet of Medical Things (IoMT) and other IoT devices. Learners will practice identification of vulnerabilities and incidents and understand the remediation methods of those exposures in a healthcare provider environment. The course provides a broad view of risk management from the perspective of healthcare providers, cybersecurity practitioners, risk management tool vendors and medical device manufacturers.
  • Practical applications of current standards-based tools and applicable technologies.



Meet Some of the Instructional Team

Two Image Column Image 1
Two Image Column Image 2

Timeframe

Learners have two years to complete the six-course professional education program, starting from the start date of your first course. Most individuals typically finish the certificate within 6 to 12 months. 

Documenting Your Success

Individual digital microcredential badges may be requested when each individual course is completed. Upon completion of the six-course program, learners may request a UT Austin certificate.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Image Right image
Image Left image

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 1

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 2

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 3

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Meet the Instructors

David Arnold

David Arnold

David Alexander Arnold Jr. is a seasoned healthcare IT executive, active duty military officer and educator with over three decades of experience. His career spans leadership roles in major health insurance companies, including Blue Cross and Blue Shield, and executive positions at firms like Fireman's Fund Insurance Company. Arnold has also served as CEO of Capsenta, a technology startup. Currently, he serves as a Captain in the Texas State Guard, focusing on IT and cybersecurity. At The University of Texas at Austin, Arnold is co-director and instructor in the Leadership in Healthcare Cyber Risk Management Certificate Program, combining his expertise in healthcare, technology and education.

Bob Chaput

Bob Chaput

Bob Chaput, author of Enterprise Cyber Risk Management as a Value Creator and Stop the Cyber Bleeding, founded Clearwater Security, a leading provider of security services, where he now serves as executive chairman. With over 40 years of experience, he advises Fortune 100 companies and government agencies. Chaput educates industry leaders through articles, presentations and webinars and holds numerous professional certifications. His work has been featured in major publications like Modern Healthcare and The Wall Street Journal and has been recognized by CyberCrime Magazine as a 2024 Cybersecurity Pundit. He is a member of the IANS Research Faculty.

Sri Bharadwaj

Sri Bharadwaj

Sriram Bharadwaj is a seasoned healthcare IT executive with over 25 years of experience across multiple industries. Currently serving as Chief Operating and Information Officer at Longevity Health, he also holds the position of CISO. Bharadwaj's extensive career includes leadership roles in provider organizations, health plans and consulting firms. His expertise spans cybersecurity, applications development and enterprise IT infrastructure, with a proven track record in performance improvements across various global regions. Bharadwaj has worked with integrated delivery networks, accountable care organizations, and academic medical centers. He is also a co-director and instructor in the Leadership in Healthcare Cyber Risk Management Certificate Program.

Todd Felker

Todd Felker

Todd Felker has 30 years of healthcare leadership. As CISO at Torrance Memorial he spent a decade building a security program. He has a proven track record of reducing organizational risk and breaking down departmental silos. As a security leader with a knack for identifying disruptive technologies, Felker was CrowdStrike’s first healthcare customer. As a healthcare executive strategist at CrowdStrike, he frequently speaks at conferences, provides threat briefings and engages with executives to review their security programs and perform platform business reviews. Felker is passionate about securing the critical infrastructure that healthcare providers are a part of and that adversaries frequently and increasingly target.

Lorem Ipsum Dolor Sit Amet

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Teacher Groups for Two Courses

Two Col Image

David Finn, Mari Savickis, Steve Snyder

Steve Snyder, Mari Savickis, and David Finn comprise an expert trio that combines legal, policy and technical expertise to offer a comprehensive view of healthcare cybersecurity. Snyder's legal and engineering background, Savickis' policy advocacy experience and Finn's decades of IT leadership create a well-rounded perspective. Together, they equip students to navigate the complex landscape of healthcare cybersecurity, from compliance to implementation.

Two Col Image

Pandian Gnanaprakasam, Wes Wright, James Sonderegger

James Sonderegger, Pandian Gnanaprakasam and Wes Wright combine expertise in educational technology, networking and healthcare IT. Sonderegger's learning management experience, Gnanaprakasam's engineering leadership and Wright's healthcare CTO background provide helpful insight into the field. This trio offers students a unique blend of technical knowledge and practical healthcare IT experience, preparing them to address complex cybersecurity challenges.

Lorem ipsum dolor sit amet, consectetur adipiscing elit

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Registration Information

Registration for this program will open in early 2025. There will be two options for students to choose when they enroll.

Pay As You Go: Each course in the program can be individually purchased. 

Bundle Pricing: Purchasing the courses as a bundle will be available for new students to the program starting in late spring 2025.

Bottom CTA Image