With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
As the cybersecurity threat landscape evolved over the past two decades, firewalls grew increasingly ineffective at blocking attackers from accessing network data. Next-generation firewalls (NGFWs) aim to fill those gaps, but do they really provide an all-encompassing solution for network security?
Download this...
The front lines for conflict in the digital age now lay at the network gateway. Unfortunately, on today's virtual battlefield, the enemy is constantly advancing. While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world...
With business networks already supporting an array of mobile devices and remote workers - often on a global scale - many IT executives expect their bandwidth demands to only accelerate, surpassing 10 Gbps by 2020.
Download this report for key findings such as:
Despite the growth in cloud-based solutions, most...
The HITRUST Cyber Threat XChange (CTX) is sharing bi-directional indicators with the Department of Homeland Security. HITRUST's Cyber Lab, in partnership with Trend Micro, identified malicious indicators of compromise several weeks in advance of the WannaCry outbreak. CTX members were able to automatically receive...
In this session, a security technologist discusses and reviews the anatomy of a breach, including the effects a breach has in real and soft money. He also reviews attacker motivations and how threat intelligence can correlate activities to help highlight indicators of compromise and analyze and mitigate the damages of...
Threat intelligence continues to play an essential role in an enterprise's security efforts. The need for operationalizing threat intelligence is crucial to all business and operational successes. Enterprises need solutions that enable them to harness the power of threat intelligence that is specific to their...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Sharing of cyberthreat information requires new technologies and methods to alert organizations of the mischief emanating from cyberspace that threatens their critical IT assets. Michael Daniel heads the not-for-profit Information Security and Analysis Organization of IT security vendors, and will address the Cyber...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
In the wake of the $81 million SWIFT transaction cyberheist from the Bank of Bangladesh - the first in a cascade of SWIFT-related heists - regulators and bankers throughout the world have stopped, taken a step back, and reviewed how interbank transactions and payments are managed and operated. The SWIFT attacks have...
The Department of Homeland Security is at the nexus of the voluntary federal program in which the private sector shares cyber threat information with the government and with other businesses. To encourage participation, Congress last year changed federal law to furnish businesses with liability protections from...
Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.