Not only are cybercriminals installing ransomware to encrypt data and freeze up systems, some attacks have evolved with the exfiltration of sensitive patient data and double extortion schemes. In some cases, backup systems are being hit as well, hampering recovery efforts from these attacks. But what are the critical...
Omar Khawaja, CISO of Highmark Health, describes his organization’s journey to enhance its security program while serving the needs of the business and providing internal customers with ease-of-use.
In this exclusive interview Khawaja will discuss:
How security programs must serve the business;
The goals of a...
Supply chain risk. Multi-cloud environments. ‘Work from Anywhere.’ It’s a challenging time for CISOs, and none knows it better than veteran cybersecurity leader Troels Oerting, former head of Global Centre of Cybersecurity at the World Economic Forum. In this exclusive session, Oerting offers his unique...
The move to remote work and a saturated digital environment has prompted many organizations to migrate to the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in...
Europol recently coordinated the disruption of the notorious Emotet botnet operation and cybercrime service. In the wake of that effort, what lessons might be applied to disrupt the ongoing damage being wrought by ransomware? And are stronger measures required, such as requiring ransom payments to be declared to...
What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?
Please join MK Palmore for a keynote discussion that will draw from his...
2020 was a year of rapid adaptation for everyone. Few industries faced the level of complexity inherent to healthcare, with stringent compliance standards and an environment where streamlined security workflows can mean the difference between life and death. We triaged the event, moving rapidly to telemedicine and...
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no...
Join Zoom's Chief Information Security Officer, Jason Lee, and Global Healthcare Lead, Ron Emerson, RN BSN, as they discuss Zoom's security and privacy strategy, best practices for security and privacy, and key applications in healthcare for virtual care.
The delivery of healthcare services using telehealth and remote medicine capabilities has soared during the COVID-19 crisis, and this is not a temporary phenomenon: telemedicine is here to stay. Not only is telemedicine here to stay, it will undoubtedly expand as healthcare organizations move to scalable hybrid cloud...
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use daily.
But in this new digital age where data...
The IT and security heads are challenged from time to time about keeping the systems up and running, with availability and cyber resilience paramount. Breaking the kill chain is critical to understand in securing the environment. How can a ‘zero trust’ architecture be used in building this network and security...
Today’s modern applications depend on of a substantial amount of open source components and third-party libraries. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base...
When it comes to enterprise security, Zero Trust is a concept that is becoming popular. More of a philosophy than a set of procedures, Zero Trust requires a deeper discussion and look at security. Is it practical for every one? Should Zero Trust be a priority? Why does it matter? What are the challenges? What is...
What do a tinker, a tailor, a soldier, a spy, a cat, George Michael, and William Foster have in common? And more importantly, what on earth do they have to do with tackling insider risk? To find the answer to this somewhat bizarre riddle, we clearly need context, which is also vital component to tackling insider risk....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.