New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform...
The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:
The state of connected device security
Where the cybersecurity needle is...
Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:
Archaic engineering principals
Threat modeling
Education...
From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.
Join this expert panel for a discussion about understanding and remediating the risks from connected devices,...
By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an...
IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature...
There is a growing demand for public cloud services as most enterprises embrace the cloud's opportunities. But there is no denying that moving to the cloud comes at a cost-increasing attack surface for every organization. Though the ever-increasing breaches of data storage services have resulted in cloud security...
Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and...
HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via...
After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all...
Millions of dollars are spent annually to set up SOCs in the healthcare industry and yet, in just the last two years alone, 89% of healthcare organizations have experienced a data breach. Why are SOCs failing? Listen as ISMG’s Nick Holland interviews Exabeam’s Chief Strategy Officer Gorka Sadowski to learn more...
Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be...
The need for agility has never been more important as healthcare organizations revise their processes and applications at an unprecedented pace, and that, in turn, has underscored the need for business-critical application performance, stability and security. As IT leaders guide their teams through ongoing business...
Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:
Work from anywhere
Supply chain risk
Medical device security
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.