Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Why Vetting AI Vendor Security Is Critical in Healthcare

    23/10/2024

    It's crucial for healthcare sector organizations to vet their artificial intelligence tech vendors in the same robust way they scrutinize the privacy and security practices of all their other third-party suppliers, said attorney Linda Malek of the law firm Crowell & Moring.

  • Study: 92% of Healthcare Firms Hit by Cyberattacks This Year

    08/10/2024

    Healthcare organizations should rethink some of their approach to security, enhancing focus on insider threats, improving cyber awareness training and securing mobile applications and devices, said Ryan Witt, vice president of industry solutions at Proofpoint, discussing findings of a new study.

  • Who Will Take the Lead in Setting Healthcare AI Regulations?

    20/09/2024

    It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.

  • Cyber Insurers Are Intensely Scrutinizing Healthcare Clients

    19/09/2024

    As threat actors continue to evolve their attacks to circumvent security measures, cyber insurers are raising the bar for prospective healthcare security clients. Underwriters are increasing their scrutiny and adding new coverage requirements, said Chris Henderson of cybersecurity company Huntress.

  • How Mega Attacks Are Spotlighting Critical 3rd-Party Risks

    18/09/2024

    Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for business associates and other suppliers, said regulatory attorney Rachel Rose.

  • Clinical Considerations When Recovering From Ransomware

    16/09/2024

    Preparing healthcare organizations to respond to and rebound from a disruptive ransomware attack is akin to implementing a "12-step program," said Dr. Eric Liederman, CEO of consultancy CyberSolutionsMD and recently retired long-serving director of medical informatics at Kaiser Permanente.

  • Eliminating the Need for Stored Credentials in Healthcare

    13/09/2024

    Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.

  • Oswal: AI, Platformization Key to Network Security Evolution

    04/09/2024

    Unifying fragmented network security technology under a single platform allows for consistent policy application across on-premises, cloud and hybrid environments, said Palo Alto Networks' Anand Oswal. Having a consistent policy framework simplifies management and improves security outcomes.

  • Top 'Privacy by Design' Considerations for Medical Devices

    18/07/2024

    The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.

  • Court's Web Tracker Ruling: What HIPAA Entities Should Know

    17/07/2024

    Healthcare groups should consider several key points about a recent Texas federal court ruling and its impact on the use of online tracker technology on the healthcare websites of HIPAA-regulated organizations, said privacy attorney Iliana Peters of the law firm Polsinelli.

  • Gaining Better Visibility Into Medical Devices, IoT, OT

    12/07/2024

    The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.

  • What Kind of People Do Cybersecurity for a Living?

    09/07/2024

    What kind of people do cybersecurity for a living? In the past, there was a formula potential practitioners followed, but today there are many ways to get into the field and having people from diverse backgrounds is valued. The Curry brothers discuss the cybersecurity profession.

  • Taking an AI-First Approach to Securing Your Organization

    08/07/2024

    Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.

  • Why Zero Trust Is Critical in Health and Government Sectors

    04/07/2024

    Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.

  • Purple Teaming: Evaluate the Efficacy of Security Controls

    01/07/2024

    Red teaming is not effective for evaluating the efficacy of preventative or detective security controls, said Jared Atkinson of Specter Ops, but purple teaming is. Purple teaming as "the evaluation of security control efficacy through atomic testing, using deliberately selected test cases."

  • Collaborate on Shifting Left: Why 'AppSec Is a Team Sport'

    27/06/2024

    Developers are using more and more open-source code because they "want to move fast," said Cycode's Lotem Guy. But the speed of development and the continuous deployment that follows means security teams have to catch up to the fast-moving development life cycle.

  • Securing Data With Immutable Backups and Automated Recovery

    25/06/2024

    Acronis President Gaidar Magdanurov discusses the need for immutable backups in the current threat landscape and highlights the benefits of integrating security measures with backup systems to facilitate automated recovery from ransomware attacks and minimize downtime.

  • Fighting Payment Fraud by Integrating Security Into Finance

    24/06/2024

    Payment fraud is the top risk to companies across the globe. Business email compromise is continually on the rise. Johnny Deutsch, co-founder and CEO of B2B payments protection company Creednz, discusses the need to integrate security into financial processes.

  • Getting a Firmer Grip on AI Privacy Concerns in Healthcare

    17/06/2024

    Artificial intelligence technologies offer tremendous promise in healthcare, but it's crucial for organizations to carefully assess the complex data privacy concerns involved with different types of AI products and deployments, said Karen Habercoss, chief privacy officer at UChicago Medicine.

  • Managing Chaos in Massive Healthcare Sector Cyberattacks

    14/06/2024

    The chaos experienced by thousands of healthcare organizations in the wake of the massive Change Healthcare cyberattack and IT outage in February is proof that most organizations are simply unprepared for such devastating incidents, said Bryan Chnowski, deputy CISO at Nuvance Health.

página 4 de 143