A new exploit opportunity has fallen into the laps of Cybercriminals. They have now set their sights on the virtual (and volatile) world of cryptocurrency. Since the start of 2017 various currencies have rocketed and tumbled in value - this represents a valuable new opportunity for cybercriminals to increase their...
Given current, turbulent conversations around physical and cybersecurity, it's hard to get an exact pulse on the state of the industry and where to start shoring up corporate processes to protect information. But with business and personal safety on the line, it's become increasingly important to be able to identify...
Learn how common Security Program mistakes occur, and real-life examples for how they can be prevented. The panel discussion, moderated by a former CIO and conducted by healthcare security professionals, will explore these topics and invite audience participation.
Join us as we discuss:
New insights into everyday...
Interconnected medical devices can pose tremendous risk to data security and patient safety. How can healthcare entities keep up with the ever growing list of vulnerabilities involving medical devices, and new emerging threats? A top FDA official provides an update on the state of medical device security, and FDA's...
What are healthcare entities doing to better position themselves for battle in the evolving cyber threat landscape? CISOs discuss what they're doing with their SOC, SIEM, behavioral analytics, virtual desktops, endpoint protection, and more.
In this session, panelists will discuss:
The key vulnerabilities putting...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
One thing we know for certain - cyberthreats and cyber-risks are growing, perhaps exponentially. So how can small and medium-sized healthcare institutions and practices, which lack the resources of Fortune 100 companies but have extremely valuable data, address these risks? The answer lies in finding solutions that...
New developments in technology are changing everything - from how we work to how we communicate - and how we secure our healthcare environments. But healthcare has been relatively slow in adopting new technologies, particularly the cloud, citing security and privacy concerns. In this session, you will learn best...
A persons PHI can often be so detailed and complete, hackers and fraudsters can refer to it as a "fullz", meaning it contains enough PII to completely take over someone's identity. This makes this information highly valuable to those communities especially as many other types of fraud can also be committed with it....
The HHS Office for Civil Rights' much-delayed resumption of its random HIPAA compliance audit program is expected in the coming months. So now is the time to prepare. This session will cover the highest priority tasks that should be started immediately if not already underway to help lay the groundwork for a...
With PHI and PII increasingly becoming targets for theft - and steady rise of the resulting embarrassment, fraud, prosecutions and penalties - we need to take a fresh look at how best to protect this data from being exposed in the first place. An effective data protection strategy can only be arrived at by considering...
Mention cloud services to healthcare IT insiders and responses will vary from caution and trepidation to earnest interest. The advantages of low cost, on-demand cloud-based services are clear. However, managing their use and matching an organization's developmental, compliance and risk requirements to the right...
Any device that can communicate with anything else provides a potential open door for the valuable information it accesses and that an organization is responsible for protecting. In our rush to connect everything together, secure information handling is very often an afterthought, if ever even a thought at all.
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.