HIMSS18 Annual Conference
Wynn Las Vegas
Mar. 5, 2018

Karl West

AVP, Chief Information Security Officer
Intermountain Healthcare

As Intermountain’s Assistant Vice President and CISO, Karl is responsible for Information access, authorization, privacy, business continuity, and data governance.  Karl leads the planning, development, and implementation of the Intermountain’s information systems security program to promote information systems reliability and accessibility while protecting and defending against unauthorized access to patient information, clinical systems, networks, and data. He reviews and studies all information published by DHHS, CMS, and other regulatory bodies relative to health Information security and privacy.  As CISO, he helps to establish and maintain policies and procedures related to the release of health information.

Karl has been involved with information technology for the past 25 years.  Prior to Intermountain Healthcare, Karl was a vice president and managing partner in AT&T Consulting Services. Karl also has a keen interest in development of new technologies to improve patient care and lower patient costs.

Karl is a member of the Utah Health Information Network (UHIN) Privacy and Security Board, as well as a board member of the Weber State Computer Science Department.

Karl received a BSCS from Brigham Young University and has also received an MBA.

March 5, 2018
2:50pm - 3:15pm
Mouton 2

To better control healthcare’s mounting cost pressures, more and more, healthcare vendors are turning to the cloud to leverage efficiencies and to keep expenses in check. As a result, healthcare organizations often have no choice but to do the same; they’re being pushed by vendor partners.

This means that knowingly or unknowingly, healthcare organizations are moving more patient health information to cloud infrastructures.

As Intermountain Healthcare CISO Karl West will address, whether voluntarily or not, moving healthcare data to the cloud requires healthcare organizations to address four areas to bolster cybersecurity:

  • Identify where your data resides.
  • Understand appropriate controls to manage cloud data.
  • Strategies to manage risk: transfer, mitigate, accept or avoid?
  • Strategies to protect data.

Get Updates

Sign up to get the latest information on upcoming events.