Privileged accounts have been at the center of each recent high-profile attack. Moreover, attackers are leveraging privileged credentials as their entry point to high-value systems within the network. This session will explain how hackers that successfully exploit these credentials are able to gain a privileged...
Insider threats are fast becoming one of the greatest concerns to organizations. Whether it be a malicious insider wanting to cause harm, or unintentional insider making an error or being unknowingly coerced by an outsider, mitigating insider threats must be a priority for organizations of all shape and size.
This...
With 100,000 new infections per day, ransomware has gotten the attention of executives, IT personnel and end users. Though not typically considered an insider threat, ransomware behaves like an insider - using hijacked identities to encrypt files on endpoints and file shares. Insiders have had broad access to data...
How prevalent are incidents of damage perpetuated by trusted insiders within the healthcare industry? In this session, an expert from Carnegie Mellon University's CERT Insider Threat Center will share results of its more than 15 years of empirical research into incidents of fraud, information technology sabotage,...
What are the biggest threats to your organization's data? Recent high-profile cyberattacks would lead an organization to believe that its external threats are the most concerning. Unfortunately, this misconception allows another significant threat to your organization's critical assets to remain completely under the...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under...
Occupational fraud and insider threat is not new, and it is universal threatening all types of businesses and industries. It can be difficult to detect, and its adverse impact on the enterprise is growing. The key to building an effective strategy is to understand your organization's key vulnerabilities and risk to...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misperception allows one of the biggest threats to your organization's data to stay completely under the radar the...
You've seen the headlines about the Federal Trade Commission's messy legal battle with LabMD, a cancer screening service that was investigated for two alleged data security incidents in 2008 and 2012. Last November, an FTC administrative law judge ruled to dismiss the FTC's case against LabMD, saying the FTC "failed...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, medical, financial and professional lives. Because of this, the value of our identities, especially those that can be created from healthcare information is...
How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?
From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports...
A persons PHI can often be so detailed and complete, hackers and fraudsters can refer to it as a "fullz", meaning it contains enough PII to completely take over someone's identity. This makes this information highly valuable to those communities especially as many other types of fraud can also be committed with it....
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? It's not enough to have a breach response strategy. Do you have the right players and pieces in place to execute...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.