Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue.

The Leadership in Healthcare Cyber Risk Management professional education program is designed to develop and strengthen the next generation of healthcare leaders to meet the dynamic challenges of enterprise cyber risk management in healthcare. Comprised of six, four-week microcredential courses, this program will teach both knowledge and real-world, practical applications to manage healthcare cyber risks in the United States. This professional education program is taught by recognized healthcare cybersecurity experts from around the nation and is designed for experienced healthcare professionals in the U.S.

The program will prepare graduates for impactful jobs within healthcare organizations, the vendor community, governmental positions and in other medical settings. Current working healthcare professionals who participate in this program will be able to retrain, upskill, strengthen digital health competencies, enhance their professional profile and advance their careers.

CyberHealth-matrix.png

Receive Program Updates

Courses in This Program

Identify Enterprise Risks: Healthcare Enterprise Cyber Risk Management

Instructor: Bob Chaput

Learn the essentials of enterprise cyber risk management and the hands-on skills necessary to conduct a security risk analysis. Comprehensive, enterprise-wide risk analyses are required by law and are a foundational step to build a cybersecurity program.

Recover: Business Continuity Planning and Disaster Recovery

Instructor: David Arnold

Cyber risk from human, technology and natural disasters creates patient safety risks in healthcare which can be life threatening. Build knowledge and practical skills in planning for business continuity and disaster recovery to reduce risk and develop organizational resilience.


Manage Identity: Identity and Access Management (IAM)

Instructor: Sri Bharadwaj

This course teaches the basic principles, architecture and controls for IAM in healthcare. Learners will apply their knowledge to unique healthcare regulatory requirements, participate in practical demonstrations, and develop an IAM implementation plan.

Detect and Respond to Threats: Ransomware and Extortion

Instructor: Todd Felker

Gain an understanding of ransomware and extortion techniques targeting healthcare, including early threat detection, monitoring, incident response and containment strategies. Learners will understand how to mitigate risks to patient data and healthcare delivery, and best practices for dealing with cyber insurance, recovery and resilience.


Leverage Healthcare Policy: How Policy Impacts Healthcare

Instructors: David Finn, Mari Savickis, and Steve Snyder

This course provides a broad overview of the key policies, regulations and best practices that impact healthcare security and privacy. Learners will gain an understanding of how policies shape security and privacy operations of healthcare entities, and the roles within the entities that help ensure the protection of sensitive patient information, compliance with standards, and operational resiliency.

Protect the Internet of Medical Things (IoMT): Medical Device Security

Instructors: Pandian Gnanaprakasam, Wes Wright

Learn about basic IoMT challenges in healthcare, including how to analyze common vulnerabilities and address incidents. Gain a holistic perspective from diverse stakeholders, such as providers, vendors, medical device manufacturers, and federal regulators, about how to protect medical devices.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purust risus nec bibendum.

Additional Information

For each four-week course, learners will complete three weeks of asynchronous instruction, and in the fourth week they will have the culminating opportunity to engage in live, online, strategic conversations with subject matter experts. To highlight professional achievements in each course, learners will complete a competency-based ePortfolio that they can share with their current leadership or future employers.

Learners in all courses will be provided with Cross-Cutting, All-Program Resources that will allow them to explore current healthcare cybersecurity topics such as the impact of cyber-attacks on patient safety, artificial intelligence, and more. In addition to resources provided outside of class, all learners will receive a complimentary copy of Enterprise Risk Management as a Value Creator by Mr. Bob Chaput, an instructor in the program.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Three Col Image

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Key Learning Outcomes

Who Should Enroll

  • Experienced healthcare professionals from a variety of healthcare or healthcare-related settings who want to enhance their careers, including:
    • Clinical professionals,
    • Healthcare administrators,
    • Information Technology professionals, including Cybersecurity,
    • Emergency preparedness professionals,
    • Risk managers, and
    • Other healthcare professionals.
  • Those with at least two years of U.S. healthcare-related experience with a college degree, or five years of U.S. healthcare-related experience without a college degree.
  • Individuals currently employed in a healthcare related field. This program is not designed for those looking to enter the healthcare field or who do not have the above listed experience.

What You Will Learn

  • Strategic concepts underlying foundational enterprise risk management (ERM) and enterprise cyber risk management (ECRM).
  • How to conduct a comprehensive, enterprise-wide risk analysis using the industry-leading software-as-a-service tool, IRM|Analysis®.
  • How to understand and navigate current healthcare policies, security and privacy regulations, and laws that shape the operations of healthcare organizations. Learn what healthcare leaders need to know and do to protect sensitive patient information and comply with state and federal standards.
  • Essential knowledge needed to implement Identity and Access Management (IAM) protocols and procedures with controls within healthcare organizations.
  • How to develop Business Continuity Planning and Disaster Recovery documentation and procedures within your healthcare organization.
  • An understanding of current cybersecurity threats, including how to effectively detect and respond to ransomware and extortion attacks on healthcare organizations.
  • Knowledge and practical application to protect the Internet of Medical Things (IoMT) and other IoT devices. Learners will practice identification of vulnerabilities and incidents and understand the remediation methods of those exposures in a healthcare provider environment. The course provides a broad view of risk management from the perspective of healthcare providers, cybersecurity practitioners, risk management tool vendors and medical device manufacturers.
  • Practical applications of current standards-based tools and applicable technologies.



Meet Some of the Instructional Team

Two Image Column Image 1
Two Image Column Image 2

Timeframe

Learners have two years to complete the six-course professional education program, starting from the start date of your first course. Most individuals typically finish the certificate within 6 to 12 months. 

Documenting Your Success

Individual digital microcredential badges may be requested when each individual course is completed. Upon completion of the six-course program, learners may request a UT Austin certificate.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Image Right image
Image Left image

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 1

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 2

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Stacked Image 3

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Meet the Instructors

David Arnold

David Arnold

David Alexander Arnold Jr. is a seasoned healthcare IT executive, active duty military officer and educator with over three decades of experience. His career spans leadership roles in major health insurance companies, including Blue Cross and Blue Shield, and executive positions at firms like Fireman's Fund Insurance Company. Arnold has also served as CEO of Capsenta, a technology startup. Currently, he serves as a Captain in the Texas State Guard, focusing on IT and cybersecurity. At The University of Texas at Austin, Arnold is co-director and instructor in the Leadership in Healthcare Cyber Risk Management Certificate Program, combining his expertise in healthcare, technology and education.

Bob Chaput

Bob Chaput

Bob Chaput, author of Enterprise Cyber Risk Management as a Value Creator and Stop the Cyber Bleeding, founded Clearwater Security, a leading provider of security services, where he now serves as executive chairman. With over 40 years of experience, he advises Fortune 100 companies and government agencies. Chaput educates industry leaders through articles, presentations and webinars and holds numerous professional certifications. His work has been featured in major publications like Modern Healthcare and The Wall Street Journal and has been recognized by CyberCrime Magazine as a 2024 Cybersecurity Pundit. He is a member of the IANS Research Faculty.

Sri Bharadwaj

Sri Bharadwaj

Sriram Bharadwaj is a seasoned healthcare IT executive with over 25 years of experience across multiple industries. Currently serving as Chief Operating and Information Officer at Longevity Health, he also holds the position of CISO. Bharadwaj's extensive career includes leadership roles in provider organizations, health plans and consulting firms. His expertise spans cybersecurity, applications development and enterprise IT infrastructure, with a proven track record in performance improvements across various global regions. Bharadwaj has worked with integrated delivery networks, accountable care organizations, and academic medical centers. He is also a co-director and instructor in the Leadership in Healthcare Cyber Risk Management Certificate Program.

Todd Felker

Todd Felker

Todd Felker has 30 years of healthcare leadership. As CISO at Torrance Memorial he spent a decade building a security program. He has a proven track record of reducing organizational risk and breaking down departmental silos. As a security leader with a knack for identifying disruptive technologies, Felker was CrowdStrike’s first healthcare customer. As a healthcare executive strategist at CrowdStrike, he frequently speaks at conferences, provides threat briefings and engages with executives to review their security programs and perform platform business reviews. Felker is passionate about securing the critical infrastructure that healthcare providers are a part of and that adversaries frequently and increasingly target.

Lorem Ipsum Dolor Sit Amet

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Checklst Icon Image

Lorem Ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Teacher Groups for Two Courses

Two Col Image

David Finn, Mari Savickis, Steve Snyder

Steve Snyder, Mari Savickis, and David Finn comprise an expert trio that combines legal, policy and technical expertise to offer a comprehensive view of healthcare cybersecurity. Snyder's legal and engineering background, Savickis' policy advocacy experience and Finn's decades of IT leadership create a well-rounded perspective. Together, they equip students to navigate the complex landscape of healthcare cybersecurity, from compliance to implementation.

Two Col Image

Pandian Gnanaprakasam, Wes Wright, James Sonderegger

James Sonderegger, Pandian Gnanaprakasam and Wes Wright combine expertise in educational technology, networking and healthcare IT. Sonderegger's learning management experience, Gnanaprakasam's engineering leadership and Wright's healthcare CTO background provide helpful insight into the field. This trio offers students a unique blend of technical knowledge and practical healthcare IT experience, preparing them to address complex cybersecurity challenges.

Lorem ipsum dolor sit amet, consectetur adipiscing elit

Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Quisque at egestas neque, rhoncus posuere mi.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Lorem Ipsum Dolor Sit Amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed sit amet finibus nulla. Integer a ligula viverra, dapibus mi eu, volutpat purus. Praesent posuere et risus nec bibendum. Curabitur quam nibh, maximus lobortis tortor ac, congue pulvinar augue. Pellentesque pretium mauris eget imperdiet laoreet.

Registration Information

Registration for this program will open in early 2025. There will be two options for students to choose when they enroll.

Pay As You Go: Each course in the program can be individually purchased. 

Bundle Pricing: Purchasing the courses as a bundle will be available for new students to the program starting in late spring 2025.

Bottom CTA Image