With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization.
We will first look at what are the different types of risk, threats, and vulnerabilities on ePHI and methods to keep your data secure. We will talk though topics such as why spectre and meltdown while not a problem today, could be the cause of the next big attack. Other attacks such as ransomware, phishing, social engineering, and insider attacks will discussed to help you better understand these threats and what you need to be doing to prevent them. In addition, we will take a brief look at medical device vulnerabilities and the importance of keeping those devices secure.
Vulnerability management will be discussed and how to use it as a valuable tool to keep your organization protected. If your IT department is not deploying patches and updates to your software and infrastructure it could end up be the cause of a breach or worse a ransomware attack.
Having an incident response plan will be critical to not only have, but to have tested so when you do experience a breach or potential attack you know what to do. In addition, we will look at the importance of having a Disaster Recovery / Business Continuity Plan and how it might be necessary to declare a disaster after an incident. After the webinar, you will have the insight to take your cybersecurity program to the next level.
Why should you Attend: New threats and vulnerabilities appear in the wild daily. Are you prepared if your network becomes infected? Do you understand what your IT department is doing to protect against these attacks? What about understanding the current threats to your organization?
After attending the webinar, you will have a much deeper understanding of why your organization and its data are attack targets and what the malicious individuals are after. With an understanding of the threats, you will be able to plan and prepare so you are ready when you are compromised.
Areas Covered in the Session: