Vendors and other third-parties have been at the heart of some of the largest breaches and security incidents we’ve ever seen. That includes mishaps involving business associates, as well as vulnerabilities and exploits involving third-party software and supply chain partners. What can entities do to reduce this...
A case study: In April 2022, Microsoft, Health-ISAC and FS-ISAC took legal and technical actions to disrupt operators of the Zloader botnet and to stop criminals from distributing Ryuk ransomware used to attack hundreds of hospitals.
This session details:
What was involved in the project's effort
Lessons...
Billions of dollars are spent annually to set up security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are security programs failing? Learn how the current operating model contributes to that failure and how a...
Security is never static. New threats are constantly emerging, and misconfigurations are rampant. How do you take control of an ever-changing threat landscape? Attack yourself before hackers do. A SaaS-based breach and attack simulation - or BAS - platform, Threat Simulator continuously tests your defenses by...
It’s no secret that public cloud has provided the technical catalyst to the healthcare industry’s long-overdue modernization and the keys to the kingdom in terms of its globalization. The resulting access to usable swaths of data is invaluable – and high-risk. This session explores the unimaginable potential of...
Every healthcare entity needs to increase its SecOps team’s capacity to stay ahead of emerging threats. Consolidating your security tools into a holistic ecosystem that’s always learning and adapting is key. Begin your journey toward quick, reliable, simplified security as we review the genesis of XDR and how...
A look at the latest demands cyber insurers are making on healthcare sector entities in order to renew policies or obtain new coverage.
This session will examine:
What is driving operational investment decisions
The growing influence of insurers on the security programs of healthcare providers
If cyber...
What are the most disturbing fraud trends in healthcare and what can security professionals and CISOs do to help prevent and detect these schemes in their organizations, ranging from incidents involving malicious insiders, external bad actors, pandemic scams, intellectual property theft and more?
This session...
Whether you are a healthcare provider, insurer, pharmaceutical or life science organization, elevating the digital experience is no longer optional—it’s essential. And while there are notable differences between each industry, they are all transforming quickly and need to deliver relevant, timely, and trusted...
All of the rapid changes in healthcare trends right now (shift to telemedicine, the consolidation of providers, record system modernization) hinge on the ability to have accurate identity information dispatched when needed–with no down time. The user experience of providers and patients alike must be held to the...
Healthcare entities face unique challenges, delivering lifesaving services amidst cybersecurity and supply chain challenges that can result in fatal disruption. Join this panel discussion for first-hand views of how healthcare security leaders are managing:
The session will cover:
Foundational...
The FDA in April issued new, detailed draft guidance for the cybersecurity of pre-market medical devices. The document included proposals for how manufacturers should address security risk as part of their submissions for the FDA to give market approval for new products. What is the FDA expecting from manufacturers...
Healthcare tends to be a very compliance-minded sector. But healthcare delivery organizations need to adopt a more threat-informed defense approach to securing their entities. For instance, most compliance frameworks will check for the existence of a security control but do nothing to assess or measure the efficacy of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.