Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
![]() |
| Andrew Gettinger and Sean Smith |
![]() |
| Joshua Lee |
![]() |
| Ross Koppel Photos by Ali Uribe |
This session explored the current use of user names and passwords: their complexity, frequency of change requirements, and associated time-outs. We also explored the current status of biometrics: is it a practical implementable solution? We concluded the discussion with tokens – an alternative to biometrics to meet two-factor regulatory requirements.