Endpoint Security , Open XDR

Promising Security Technologies in the Year Ahead

Adventist HealthCare CISO Michael Prakhye on Top Challenges, Priorities
Promising Security Technologies in the Year Ahead
Michael Prakhye, Adventist HealthCare CISO

Hardware authentication and user behavior analytics are among the top promising security technologies that Michael Prakhye, CISO at Adventist HealthCare, says he'll closely examine in the year ahead.

"Hardware authentication is an interesting concept - dedicating a portion of the chipset to aid in authentication processes," he says in an interview with Information Security Media Group.

"What I would really look forward to implementing is user behavior analytics, because it's crucial for organizations to recognize malicious behavior and activity that's raising red flags," he says. That includes anomalous user behaviors, such as someone logging in from an unusual location or during suspect times, he notes.

"User behavioral analytics would let us know something is happening that we wouldn't know otherwise," the CISO adds.

Phishing Attacks

In the meantime, the battle against phishing attacks will remain a top cyber challenge for most organizations in the year ahead, Prakhye predicts.

"Most attacks are coming from phishing - people clicking on attachments and links. The firewall will help you in a layered [security] approach, but it won't prevent most of the things trying to come in at the network," he says.

In this interview (see audio link below photo), Prakhye also discusses:

  • Evolving trends involving phishing schemes and other cyberattacks;
  • Cybercrime trends, including crypto jacking;
  • Other top security priorities and challenges in 2019.

As CISO of Maryland-based Adventist HealthCare, Prakhye is responsible for the overall organizational security strategy, program oversight, information security policies, standards and awareness. Based in Gaithersburg, Maryland, Adventist HealthCare is a not-for-profit network of healthcare providers. He has over 18 years of experience in risk management, compliance, strategy and consulting within healthcare and the Department of Defense.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.