The hack of health insurer Anthem exposes data on 80 million Americans. A breach of an electronic health records vendor affects dozens of clinics. A California hospital pays a ransom to get data decrypted by hackers. These and other headline-grabbing breaches are getting the attention of CEOs and boards of directors....
Healthcare organizations must adopt a "wartime" mindset against their sophisticated, persistent attackers. But how can CISOs lead the way in developing an effective security action plan designed for the current threat environment?
In this session, experienced healthcare CISOs will:
Provide real-world insights on...
In the beginning, many reported health data breaches involved missteps, such as the theft of laptops or inappropriate access to records by insiders. Today, however, healthcare organizations are also frequent targets for attacks from nation-states looking for intellectual property or patient information as well as...
In the current threat environment, healthcare organizations need to gear up their defenses to tackle an array of cyber threats, from ransomware campaigns to nation-state attacks to hackers looking to steal patient information and sell it for a profit. The defensive effort requires a "wartime" mindset throughout the...
Protecting end-user devices is an essential part of any information security strategy. But many healthcare organizations have literally thousands of medical devices - from infusion pumps to heart monitors - used in patient treatment that can be vulnerable, opening the door to a broader cyberattack. In this session,...
It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session,...
Mobile banking is the highest margin channel for your financial institution. It provides your organization with the profitability and customer engagement you have been seeking for decades. Your customers are eager to adopt this channel as 68% of them view it as the primary way they will bank within 2 years; however,...
All industries are adversely affected by the growing number of cyberattacks. But for the healthcare sector, with its large volume of structured patient information and patient care's increasing reliance on the use of electronic data - the growing sophistication of the attacks has forced it to focus on cybersecurity as...
The Obama administration has implemented a number of cybersecurity and privacy initiatives and policies aimed at making IT more secure for the federal government and the private sector, including the cybersecurity framework, National Strategy for Trusted Identities in Cyberspace, employing encryption and sharing cyber...
The Department of Homeland Security is at the nexus of the voluntary federal program in which the private sector shares cyber threat information with the government and with other businesses. To encourage participation, Congress last year changed federal law to furnish businesses with liability protections from...
The cyber-defense challenge is an evolving and complex one for both public entities and private industry. States, in particular, have become a testing ground for new approaches and best practices. In this session, you'll hear how the Commonwealth of Virginia is approaching cybersecurity; how the Office of the...
Card fraud, account takeovers, business email compromises and emerging cybersecurity regulations and risks have kept, and continue to keep, plenty of CEOs and CISOs up at night. While it's impossible to focus time, energy and resources on all of today's fraud and cybersecurity risks, wise banking executives have...
In this session, you'll learn of some of the latest fraud trends and challenges specific to Florida banks. You'll hear insights from the Florida Banking Associations Fraud-Net system, as well as some real world examples from the front lines of the information security challenges at one Florida bank, including...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.