Healthcare Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Case Study: The Devastating Impact of a Ransomware Attack

    30/05/2019

    One of the earliest ransomware victims in the healthcare sector has a strong message for organizations that believe they won't be targeted: Get prepared for an attack - otherwise you risk a devastating impact.

  • Open Source Security - How to Defend at the Speed of Attack

    30/05/2019

    On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation.

  • Healthcare's Unique Digital Transformation

    24/05/2019

    The term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion.

  • Executive Roundtable Recap: Securing the Digital Enterprise

    24/05/2019

    ISMG and Fortinet hosted a roundtable dinner in Nashville, TN on May 15 focused on "Securing the Digital Enterprise". Challenges in gaining internal buy in for security initiatives and the problems of M&A activity were discussed, and Sonia Arista, National Healthcare Lead of Fortinet provided her insight on the event in this exclusive interview.

  • WannaCry Still Causing Tears 2 Years On

    24/05/2019

    The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

  • Verizon DBIR: C-Level Executives in the Crosshairs

    22/05/2019

    C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.

  • Lack of Secure Coding Called a National Security Threat

    20/05/2019

    The lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Institute for Critical Infrastructure Technology. In an interview, Rob Roy, co-author of the report, outlines what steps should be taken to encourage or enforce secure coding practices.

  • Minimizing Cloud Security Risks

    17/05/2019

    Healthcare organizations need to take bold steps to help ensure that their cloud services providers are effectively protecting patient data. That's the advice of John Houston, CISO of UPMC, and Ira "Gus" Hunt, a security specialist at the consultancy Accenture Federal Services.

  • WhatsApp's Spyware Problem

    17/05/2019

    The latest edition of the ISMG Security Report digs into the WhatsApp flaw that paved the way for spyware installation. Also: Microsoft patches old operating systems and a 'virtual CISO' sizes up security challenges.

  • Tips on Tackling Medical Device Cybersecurity Challenges

    16/05/2019

    To ensure data integrity and patient safety, healthcare organizations must tackle a number of medical device security challenges, ranging from asset management to patching, says security expert Evan Francen, who offers tips.

  • WhatsApp Exploit Reveals 'Legalized Hacking' at Work

    14/05/2019

    Attackers exploiting a buffer overflow in WhatsApp's signaling software to automatically infect devices with malware - without users even having to answer their phone - and then alter call logs to hide attack traces is "a bit of a nightmare scenario," says cybersecurity expert Alan Woodward.

  • Capturing ROI on Your Unified Endpoint Management Investment

    14/05/2019

    Unified endpoint management exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT and security leaders approach UEM? John Harrington Jr. and Ryan Schwartz of IBM MaaS360 with Watson share insight.

  • Life as a 'Virtual CISO'

    14/05/2019

    Serving as a "virtual CISO" offers advantages as well as challenges, says Doug Copley, who's a CISO contractor for several healthcare sector entities. He shares insights on this unusual job opportunity.

  • The Future of Digital Onboarding

    10/05/2019

    The way many organizations have handled digital onboarding is fraught with risk - including fraud. But Husayn Kassai, CEO of Onfido, envisions a new future that includes a healthy amount of friction and greater security.

  • The Rise of Security-Driven Networking

    10/05/2019

    Traditionally, enterprises have built networks and then added security elements. But in what he describes as "the third generation of security," Fortinet's John Maddison promotes a model of security-driven networking. Hear how this can improve an organization's security posture.

  • DeepDotWeb Goes Dark

    10/05/2019

    The latest edition of the ISMG Security Report analyzes the FBI takedown of DeepDotWeb, a dark net portal. Also featured are discussions on healthcare app security and the repercussions of poor coding security.

  • Responding to Blended Cyberattacks

    09/05/2019

    Typically, organizations see automated or manual attacks - one type or the other. But increasingly cyberattackers are striking with blended attacks, and the growth and impact of these strikes is concerning. Dan Schiappa of Sophos discusses how to improve detection and defense.

  • Executive Roundtable Recap: "Confessions of a Healthcare CISO"

    08/05/2019

    ISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO".

  • Safeguarding PHI in Healthcare Apps: Critical Steps

    07/05/2019

    When a healthcare provider develops its own applications that handle patient data, it must take critical steps to safeguard protected health information and ensure HIPAA compliance, says privacy attorney Adam Greene.

  • Cultural Challenges and Digital Transformation

    06/05/2019

    ISMG and Zscaler hosted a roundtable dinner in Morristown, New Jersey on April 11 focused on security's role in digital transformation.

página 46 de 171