This session will review the latest trends in ongoing and emerging cyberthreats posed by cybercriminals. FBI Supervisory Special Agent Matt Braverman will walk through the latest tactics being used in ransomware, business email compromise exploits and other cyber-extortion schemes, and discuss the FBI's stance on how...
In 2016, many organizations were victims of ransomware attacks while others believe they will become a target this year.
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems....
In 2010, a computer security firm in Belarus stumbled upon Stuxnet, a mysterious virus of unparalleled complexity that was attacking systems in Iran. Unlike any other virus or worm built before, this one didn't just simply hijack the targeted computers or steal information from them, it escaped the digital realm to...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants, being used to extort individuals and organizations. Ransomware-DDoS hybrid attacks, like Cerber, have showcased how attackers have added DDoS capabilities to ransomware....
Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But...
Making the right decisions about how to deploy Office 365 can be a show-stopper, particularly as you consider branch office and remote user connectivity. Each Office 365 user generates between 12 and 20 persistent connections. Each connectivity option, ExpressRoute, hub-and-spoke or direct-to-Internet, deals with this...
This monthly Security Agenda will highlight some of the most recent additions to our course library. March's edition features Former Federal CISO
Gregory Touhill giving a "Cyber State of the Union." Other industry influencers like Retired RSA Chair Art Coviello, FBI Cyber Division Supervisory Special Agent Jay...
The business of the cyberattack has matured into a billion dollar industry. Forrester even predicts the devastating effects of a cyberbreach will lead to the failure of a Fortune 1000 company in 2017 (Predictions 2017: Cybersecurity Risks Intensify, November 2016, Forrester). Extortion-based attacks like ransomware...
With Verizon's data breach investigations team finding that 90 percent of breaches trace to a phishing or other social engineering attack, lead investigator Chris Novak says that using multifactor authentication should be a no-brainer for all organizations.
This monthly Security Agenda will highlight some of the most recent additions to our course library. February's edition features Gartner analyst Avivah Litan discussing "Endpoint Detection and Behavioral Analytics." Other industry influencers like RSA's Principal Manager of Identity Protection, Angel Grant, Co-Founder...
Cyber crime and money laundering are growing and evolving at a faster rate than many organizations can keep pace with, especially while staying within regulatory requirements. The result is an uncertain and rapidly-changing global financial landscape.
Download this white paper to:
Better understand the threat of...
In a reminder that healthcare organizations continue to be targeted by more than just crypto-locking extortionists, a cyberattack against an NHS trust didn't involve ransomware - as some initial reports suggested - but rather a never-before-seen Trojan.
There has been a proliferation of ransomware attacks against healthcare organizations that has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious, sophisticated and are growing in popularity.
In order to defend...
Has the healthcare sector finally reached a data security tipping point? Dave Summitt, CISO of H. Lee Moffitt Cancer Center, and many of his peers think so. And it's about time.
From headline-making data breaches to hacktivist attacks, there never have been so many high-profile incidents, which in turn have sparked greater public awareness of information security risks.
Now, more than ever, regulators, board members and even customers are asking smart questions about information security,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.