Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Why Vetting AI Vendor Security Is Critical in Healthcare
23/10/2024It's crucial for healthcare sector organizations to vet their artificial intelligence tech vendors in the same robust way they scrutinize the privacy and security practices of all their other third-party suppliers, said attorney Linda Malek of the law firm Crowell & Moring.
-
Study: 92% of Healthcare Firms Hit by Cyberattacks This Year
08/10/2024Healthcare organizations should rethink some of their approach to security, enhancing focus on insider threats, improving cyber awareness training and securing mobile applications and devices, said Ryan Witt, vice president of industry solutions at Proofpoint, discussing findings of a new study.
-
Who Will Take the Lead in Setting Healthcare AI Regulations?
20/09/2024It's yet to be determined whether a handful of states or the federal government will lead the charge in adopting comprehensive regulations involving the use of artificial intelligence in healthcare, said regulatory attorney Betsy Hodge, a partner in law firm Akerman.
-
Cyber Insurers Are Intensely Scrutinizing Healthcare Clients
19/09/2024As threat actors continue to evolve their attacks to circumvent security measures, cyber insurers are raising the bar for prospective healthcare security clients. Underwriters are increasing their scrutiny and adding new coverage requirements, said Chris Henderson of cybersecurity company Huntress.
-
How Mega Attacks Are Spotlighting Critical 3rd-Party Risks
18/09/2024Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for business associates and other suppliers, said regulatory attorney Rachel Rose.
-
Clinical Considerations When Recovering From Ransomware
16/09/2024Preparing healthcare organizations to respond to and rebound from a disruptive ransomware attack is akin to implementing a "12-step program," said Dr. Eric Liederman, CEO of consultancy CyberSolutionsMD and recently retired long-serving director of medical informatics at Kaiser Permanente.
-
Eliminating the Need for Stored Credentials in Healthcare
13/09/2024Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.
-
Oswal: AI, Platformization Key to Network Security Evolution
04/09/2024Unifying fragmented network security technology under a single platform allows for consistent policy application across on-premises, cloud and hybrid environments, said Palo Alto Networks' Anand Oswal. Having a consistent policy framework simplifies management and improves security outcomes.
-
Top 'Privacy by Design' Considerations for Medical Devices
18/07/2024The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.
-
Court's Web Tracker Ruling: What HIPAA Entities Should Know
17/07/2024Healthcare groups should consider several key points about a recent Texas federal court ruling and its impact on the use of online tracker technology on the healthcare websites of HIPAA-regulated organizations, said privacy attorney Iliana Peters of the law firm Polsinelli.
-
Gaining Better Visibility Into Medical Devices, IoT, OT
12/07/2024The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.
-
What Kind of People Do Cybersecurity for a Living?
09/07/2024What kind of people do cybersecurity for a living? In the past, there was a formula potential practitioners followed, but today there are many ways to get into the field and having people from diverse backgrounds is valued. The Curry brothers discuss the cybersecurity profession.
-
Taking an AI-First Approach to Securing Your Organization
08/07/2024Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
-
Why Zero Trust Is Critical in Health and Government Sectors
04/07/2024Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.
-
Purple Teaming: Evaluate the Efficacy of Security Controls
01/07/2024Red teaming is not effective for evaluating the efficacy of preventative or detective security controls, said Jared Atkinson of Specter Ops, but purple teaming is. Purple teaming as "the evaluation of security control efficacy through atomic testing, using deliberately selected test cases."
-
Collaborate on Shifting Left: Why 'AppSec Is a Team Sport'
27/06/2024Developers are using more and more open-source code because they "want to move fast," said Cycode's Lotem Guy. But the speed of development and the continuous deployment that follows means security teams have to catch up to the fast-moving development life cycle.
-
Securing Data With Immutable Backups and Automated Recovery
25/06/2024Acronis President Gaidar Magdanurov discusses the need for immutable backups in the current threat landscape and highlights the benefits of integrating security measures with backup systems to facilitate automated recovery from ransomware attacks and minimize downtime.
-
Fighting Payment Fraud by Integrating Security Into Finance
24/06/2024Payment fraud is the top risk to companies across the globe. Business email compromise is continually on the rise. Johnny Deutsch, co-founder and CEO of B2B payments protection company Creednz, discusses the need to integrate security into financial processes.
-
Getting a Firmer Grip on AI Privacy Concerns in Healthcare
17/06/2024Artificial intelligence technologies offer tremendous promise in healthcare, but it's crucial for organizations to carefully assess the complex data privacy concerns involved with different types of AI products and deployments, said Karen Habercoss, chief privacy officer at UChicago Medicine.
-
Managing Chaos in Massive Healthcare Sector Cyberattacks
14/06/2024The chaos experienced by thousands of healthcare organizations in the wake of the massive Change Healthcare cyberattack and IT outage in February is proof that most organizations are simply unprepared for such devastating incidents, said Bryan Chnowski, deputy CISO at Nuvance Health.