Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
We've talked a lot in recent times about data breaches and data loss. But what about pure data integrity - not just whether it can be stolen, but whether it can be secretly altered?
This is a topic close to the heart of Diana Kelley, a cybersecurity field CTO for Microsoft. She has addressed the topic at recent ISMG...
GDPR. NIST CSF. NY DFS. These acronym laws and standards can be maddening to navigate clearly for legal and compliance teams. Particularly when the threat landscape is ever evolving, and the threat actors - from outside and within - are unrelenting. This is why we have designed these sessions as an opportunity for...
This month we spotlight the critical cybersecurity challenges facing healthcare sector organization. Explore why a focus on compliance-driven security risk programs can put entities at a great disadvantage in dealing with these challenges - and what's needed to implement a more war-minded approach to battle the...
November 1 ushers in a whole new era of breach notification requirements for Canada. What are the new standards, and how prepared are Canadian organizations? In this edition of Security Agenda, attorney Imran Ahmad of Miller Thomson LLP shares insights. Among them:
"In many ways, Canada had been playing catch-up to...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features the world's first CISO, Stephen Katz, discussing how the role of the modern CISO has evolved. Another key influencer, Gartner's Avivah Litan, discusses the lure of blockchain. This edition...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
"Know your customer" is a familiar refrain in banking circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone actors. In...
By exploring the answers to a series of novel questions (e.g. what do mobile payments and driverless cars have in common?), this talk will illustrate new approaches to preventing and stopping fraud by first illustrating the paradoxes of applying traditional approaches to a variety of new and emerging use cases (cloud,...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
Fraud is a pervasive and insidious attack on all. Financial service organizations, retailers, insurers, healthcare providers, governments - they all bear the burden. What can be done to more effectively reduce this scourge?
In this session, Art Coviello, former CEO of RSA Security, draws on his decades of security...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
Fraud resulting from cyber theft continues to plague organizations as attackers use more aggressive means of gaining access to critical data more frequently. From the CEO's cellphone to it partners and vendors (and their children), everyone is a target. Business leaders need to understand the implications of choosing...
Business email compromise attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session reviews why email spoofing works, the...
Most organizations today have a complex and huge supplier/partner ecosystem. Many different vendors supply many different products and services. And yet most enterprise third-party security programs still rely on manual, point-in-time, largely subjective assessments to evaluate and manage the security risk of their...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.