Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
![]() |
| Panel 4 |
![]() |
| Kai Zheng |
![]() |
| Brad Malin |
![]() |
| Laurie Williams |
![]() |
| Joe Hall Photos by Ali Uribe |
Auditing is considered a key deterrent and detection strategy for abuse of electronic health records. However, current techniques are too ad hoc and reactive to deal effectively with the emerging range of threats. The panel discussed research advances made in building a rigorous foundation for auditing that better addresses these challenges and opens new opportunities for the use of audit logs.