Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Gaining Better Visibility Into Medical Devices, IoT, OT
12/07/2024The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.
-
Enhancing Cyber Defense with AI-Powered SOCs
10/07/2024Driven Technologies Chief Operating Officer Vinu Thomas provides an in-depth look at how AI and automation are enhancing cybersecurity. He talks about the shift to distributed environments, the integration of security tools, and the effectiveness of AI in threat detection and response.
-
What Kind of People Do Cybersecurity for a Living?
09/07/2024What kind of people do cybersecurity for a living? In the past, there was a formula potential practitioners followed, but today there are many ways to get into the field and having people from diverse backgrounds is valued. The Curry brothers discuss the cybersecurity profession.
-
Taking an AI-First Approach to Securing Your Organization
08/07/2024Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
-
Why Zero Trust Is Critical in Health and Government Sectors
04/07/2024Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.
-
Purple Teaming: Evaluate the Efficacy of Security Controls
01/07/2024Red teaming is not effective for evaluating the efficacy of preventative or detective security controls, said Jared Atkinson of Specter Ops, but purple teaming is. Purple teaming as "the evaluation of security control efficacy through atomic testing, using deliberately selected test cases."
-
Collaborate on Shifting Left: Why 'AppSec Is a Team Sport'
27/06/2024Developers are using more and more open-source code because they "want to move fast," said Cycode's Lotem Guy. But the speed of development and the continuous deployment that follows means security teams have to catch up to the fast-moving development life cycle.
-
Securing Data With Immutable Backups and Automated Recovery
25/06/2024Acronis President Gaidar Magdanurov discusses the need for immutable backups in the current threat landscape and highlights the benefits of integrating security measures with backup systems to facilitate automated recovery from ransomware attacks and minimize downtime.
-
Fighting Payment Fraud by Integrating Security Into Finance
24/06/2024Payment fraud is the top risk to companies across the globe. Business email compromise is continually on the rise. Johnny Deutsch, co-founder and CEO of B2B payments protection company Creednz, discusses the need to integrate security into financial processes.
-
Getting a Firmer Grip on AI Privacy Concerns in Healthcare
17/06/2024Artificial intelligence technologies offer tremendous promise in healthcare, but it's crucial for organizations to carefully assess the complex data privacy concerns involved with different types of AI products and deployments, said Karen Habercoss, chief privacy officer at UChicago Medicine.
-
Managing Chaos in Massive Healthcare Sector Cyberattacks
14/06/2024The chaos experienced by thousands of healthcare organizations in the wake of the massive Change Healthcare cyberattack and IT outage in February is proof that most organizations are simply unprepared for such devastating incidents, said Bryan Chnowski, deputy CISO at Nuvance Health.
-
The Dangers of Over-Relying on Too Few Critical Vendors
14/06/2024Many healthcare organizations have discovered major gaps in business operations preparedness - the ability to quickly rebound from major IT disruptions, such as those caused by the Change Healthcare cyberattack. Jigar Kadakia, CISO of Emory Healthcare, said it's time to come up with a Plan B.
-
How the Growing Demands of Healthcare Are Complicating Risk
14/06/2024Healthcare is increasingly complex and interconnected, and the push to exchange more digital patient information among providers adds to the threat of busy staff falling victim to phishing and other scams that can jeopardize data, said Krista Arndt, CISO of United Musculoskeletal Partners.
-
Learning From Others' Gaps in the Wake of Major Attacks
13/06/2024It's critical for CISOs to study what went wrong in major ransomware IT disruptions and breaches hitting the healthcare sector and to look closely within their own organizations for similar gaps or vulnerabilities, said Michael Prakhye, CISO of Adventist HealthCare.
-
Ransomware: Disruption of Hospitals and Nearby Facilities
12/06/2024A study investigating the impact of ransomware attacks on hospitals and the ripple effect on nearby facilities is a call to action for policymakers to seriously address how those assaults can be better handled in the health sector, said researchers Rahi Abouk and David Powell.
-
Collaborative Security: The Team Sport Approach
07/06/2024By decentralizing the ownership of cybersecurity and increasing security consciousness among everyone in the organization, businesses can improve their security posture, said Dom Lombardi, the vice president of security and trust at Kandji. He discussed the concept of collaborative security.
-
What's in Biden's Security Memo for the Healthcare Sector?
31/05/2024A recent White House memo on bolstering the security and resiliency of critical infrastructure sectors calls for comprehensive mapping and risk assessment of all critical components and interdependencies within the healthcare ecosystem, said Greg Garcia of the Healthcare Sector Coordinating Council.
-
Silver SAML Threat: How to Avoid Being a Victim
20/05/2024Semperis researcher Eric Woodruff discovered Silver SAML - a new technique used to launch attacks from an identity provider against applications configured to use it for authentication. How does it differ from Golden SAML, and how can enterprises respond to the threat? Woodruff shares insight.
-
Healthcare Identity Security: What to Expect from Your Solution
13/05/2024What are the key elements of a successful identity security program, and what are common pitfalls organizations experience when launching one? SailPoint healthcare experts Matthew Radcliffe and Rob Sebaugh detail myths and realities of today’s cloud-based identity security deployment strategies.
-
The Challenges in Keeping Medical Device Software Updated
06/05/2024Updating software as new vulnerabilities are discovered persistently remains a top medical device cybersecurity challenge, said David Brumley, a cybersecurity professor at Carnegie Mellon University and CEO of security firm ForAllSecure. Solving this requires a major mindset shift, he said.