Health organizations face a wide range of new cyber security threats like crypto-jacking and IoT vulnerabilities while still facing the heavy load of compliance and basic security blocking and tackling. Security requires an end to end framework based approach to manage well against a constantly evolving threat...
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization...
With the extensive network systems found in the health care industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and...
What does it take to securely migrate nearly all your systems and data onto the cloud, phase out your own on-premises data center, and build shared cyber risk responsibility with third-parties? That's a journey under way at health insurer Wellmark. The health insurer's vice president and CISO Thien La will describe...
An inside view of what HHS OCR is seeing on the healthcare sector privacy and security landscape, and what the agency has in the works to address those challenges. That includes:
Insights from OCR's latest breach and compliance investigations of covered entities and BAs.
An update on OCR's HIPAA enforcement...
Following the HHS OCR presentation, a panel of CISOs and regulatory and legal experts will dig into how major health data breach trends are changing, and why. For instance:
What lessons can be learned from some of the latest breach trends, including the steady surge in reported hacker incidents
Cybercriminals,...
Some of the biggest health data breaches - including headliner Wall of Shame breaches in 2018 - are due to insiders who click on phishing emails, and fall for business email compromise scams. While there is also plenty of record snooping by insiders, healthcare also has its share of malicious bad actors looking to...
Breaches and other cyber incidents involving business associates and other vendors can have a devastating impact. What can healthcare sector entities do to reduce and better manage those risks? Our panel of CISOs and other experts will explore:
The growing risks posed by vendors
Challenges involving cloud vendors...
What's the state of healthcare information security, and how are the healthcare sector and government agencies working to address the increasingly complex cyber challenges? Our presenter provides insights into the latest efforts and hot topics, including:
How the sector can implement key cyber recommendations from a...
A panel of experts join keynoter Greg Garcia to dig into some of the most critical recommendations by the Department of Health and Human Services' cyber task force for improving the state of cybersecurity in the healthcare sector. The panel will discuss:
The current state of one or more of the key imperatives, such...
It's no secret that the healthcare industry is increasingly under attack by cybercriminals. And risky end-user behaviors are only exacerbating the threat. Yet, user awareness training is always a challenge for organizations. How do you effectively train users to stop clicking on links or opening attachments? This...
Are you sure you're adequately protected from the modern-day DDoS attack? This session will discuss findings from NETSCOUT Arbor's August 2018 Global Threat Intelligence Report which shows that DDoS attacks are not only increasing in frequency and complexity, but they are also routinely being used by hactivists,...
Cyber Criminals are increasingly exploiting the Internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and taken over. This session will explain how the correlation of Internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs) can be used to build...
According to the 2017 Identity Theft Resource Center (ITRC) Data Breach Report, healthcare was the second most significant contributing industry to overall data breaches with 334 breaches reported. Data breaches are crippling to any business, but are extra hard on healthcare organizations, considering the vast amount...
While the industry hasn't seen a high profile breach in some time, healthcare cyber attacks have become an ever present occurrence with more than one breach now being reported every day. And while the focus of cybercriminal activity has largely moved away from ransomware, people (and not just healthcare executives)...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.