SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
WEBINAR WELCOME!
Cybersecurity and the New Age of Hackers
Gary Barnes
CIO
Medical Center
Health System
Odessa, Texas
Dr. John Halamka
CIO, Beth Israel Deaconess
Medical Center, Boston
Vice chair, federal Health
Information Technology
Standards Committee
Joseph Conn
Reporter Modern
Healthcare
During today’s discussion, feel free to submit
questions at any time by using the questions box.
A follow-up e-mail will be sent to all attendees
with links to the presentation materials online.
Lillian Ablon
Researcher in cybersecurity
and computer
network operations
RAND Corp.
Santa Monica, Calif.
Panelists:
WEBINAR HOUSEKEEPING
WEBINAR
NOW SPEAKING
Cybersecurity and the New Age of Hackers
Please use the questions box on your webinar
dashboard to submit questions to our moderator
Joseph Conn
Reporter
Modern Healthcare
WEBINAR
NOW SPEAKING
Cybersecurity and the New Age of Hackers
Please use the questions box on your webinar
dashboard to submit questions to our moderator
Lillian Ablon
Researcher in cybersecurity and
computer network operations
RAND Corp.
Santa Monica, Calif.
A Cyber Overview:
black markets, threat actors, and
our increasingly digital landscape
Lillian Ablon
lablon@rand.org
@LilyAblon
Data often appears withinData often appears withinData often appears withinData often appears within
days on black market sitesdays on black market sitesdays on black market sitesdays on black market sites
Ablon - 4
• How do cyber thieves
get the tools to steal
the data?
• What happens to the
data after it’s stolen?
• What do the markets
look like?
• How mature are these
markets?
Report available at:
http://www.rand.org/pubs/research_reports/RR610.html
Ablon - 5
• Growing and maturing
• Increasingly sophisticated
• Resilient and adaptive
• Easy for buyers to get involved in
The markets for cybercrime are:
Image Credit: Juniper Networks
Report available at:
http://www.rand.org/pubs/research_reports/RR610.html
Ablon - 6
There are different types of cyber threat
actors, each motivated by different things
Icons by The Noun Project: Money by Joe Mortelli; Protest by Jakob Vogel; Globe by Tyrus; Cyberterror by Luis Prado, via CC 2.0.
Hacktivists State-Sponsored CyberterroristsCybercriminals
Ablon - 7
Icons by The Noun Project: Money by Joe Mortelli; Globe by Tyrus
State-Sponsored
Cybercriminals
What can cyber actors do with
our stolen health data?
Ablon - 8
Icons by The Noun Project: Money by Joe Mortelli; Globe by Tyrus
State-Sponsored
Cybercriminals
• Medical records on the black markets can be
worth up to $50
• Harvest email addresses and contact list to
conduct phishing attacks
• Exploit password re-use
• Commit identity theft, tax or medical fraud
• Resell prescription medication
• Build profiles of possible targets for follow-
on surveillance, reconnaissance, and
intelligence campaigns
• Use data for corporate extortion to
blackmail companies who are responsible
for data protection
What can cyber actors do with
our stolen health data?
Ablon - 9
Our worlds are digital
Ablon - 10
How can we protect ourselves?
Reconsider convenience
Employ multifactor authentication,
encryption, password best practices
Be vigilant of newly connected
devices and the “Internet of Things”
Invest in security from the start
Ablon - 12
Lillian Ablon
lablon@rand.org
@LilyAblon
WEBINAR
NOW SPEAKING
Cybersecurity and the New Age of Hackers
Please use the questions box on your webinar
dashboard to submit questions to our moderator
Gary Barnes
CIO
Medical Center Health System
Odessa, Texas
Why do we have that information on the Internet?
Who is Responsible for Protecting Your Organization
against Cyber Attacks?
Have you had a Full Security Audit for Your Organization?
And not just a HIPAA Audit!
Your Organization has to Offense, not Defense!
Daily Huddle to discuss issues, including Malware
Response Reports
Reasons to be Concerned
• Private or sensitive data exposed
• Denial of service attacks
• Financial losses
• Customer records compromised or stolen
• Your Organizations Reputation can be effected
Cyber Security Life Cycle Yearly
External Access – Organization and
Contractors
Blocking and Thwarting Workstation
Infections
Safeguarding External Facing Servers
Safeguarding Internal Servers
Keeping the Workstation Clean
Staying Compliant
Knowledge Sharing
VPN and NAT Access Validated Yearly
• Good time to Check BAA (Business Associate
Agreements) current and up-to-date
• Close access to/from outside entities that no longer
have an association
• Catch any NAT'ed resources that are no longer used
External Access – Org to Org
• Block Dangerous World Region traffic from coming in or
going out - Russia, China
– Both on Firewall and Email systems
– Outgoing is important to block - keeps already infected
devices from contacting Master Controllers in those regions
• DNS Firewall
– Keeps devices from going to malware websites or clicking
on malicious links
– Preventing infections from happening
– Disrupting infected clients ability to communicate with
Master Controllers
Blocking and Thwarting Workstation Infections
Safeguarding Externally Facing Servers
• Incorporate regular external vulnerability scans into security
routine
• Stay on top of new vulnerabilities - POODLE, ShellShock
• Regularly scan for new devices in external ranges
Teams sometimes implement new devices without
following procedures
• Keeping workstations clean!
Patch all software (3rd Party) as well as OS
o Cyber-attacks are going after software that
usually remains unpatched - Adobe, Java
Manage and monitor for patch/antivirus
compliance
Put mechanism in place to push emergency
patches/fixes out quickly
Keeping Workstations Clean!
Safeguarding Internal Devices
Why it’s important!
• Internal Cyber-Attacks are increasing!
Running regular internal vulnerability scans
should be as robust as external vulnerability
scans
• Put procedures in place to build hardened
secure servers
• Tune IPS alerts as tightly as possible
Send real-time alerts
Feel for what is going on in environment
Cyber Security Life Cycle Yearly
WEBINAR
NOW SPEAKING
Cybersecurity and the New Age of Hackers
Please use the questions box on your webinar
dashboard to submit questions to our moderator
Dr. John Halamka
CIO, Beth Israel Deaconess
Medical Center, Boston
Vice chair, federal Health
Information Technology
Standards Committee
Security Update
March 2015
Major National Incidents
• Community Health Systems, Anthem, JP Morgan,
Home Depot, Target
• Vulnerabilities include Heartbleed, Shellshock,
Poodle
• In a world of healthcare mergers and acquisitions,
you are as vulnerable as your weakest link
BIDMC Incidents
• 2012 stolen laptop/attorney general consent
judgement
• 2013 infected radiology workstation/OCR
investigation
• Our own social engineering efforts
14 Workstreams
Evolving technologies
• Malware detection
• Analytics - Security Incident and Event
Management (SIEM)
• Consumer technologies - strong encryption built
into endpoints
• Ricoh’s healthcare camera
• Secure texting applications
Building Maturity
• The attacks are increasing in number and
sophistication
• People, Process and Technologies must be addressed
in combination
• Education is key
• Budgets and staff must be increased
• Healthcare is behind but enforcement is motivating
Boards to prioritize security
WEBINAR
TODAY’S PANELISTS
Cybersecurity and the New Age of Hackers
During today’s discussion, feel free to submit questions at any time by using the questions box
Gary Barnes
CIO
Medical Center
Health System
Odessa, Texas
Dr. John Halamka
CIO, Beth Israel Deaconess
Medical Center, Boston
Vice chair, federal Health
Information Technology
Standards Committee
Joseph Conn
Reporter Modern
Healthcare
Lillian Ablon
Researcher in cybersecurity
and computer
network operations
RAND Corp.
Santa Monica, Calif.
Expect a follow-up email within two weeks
with links to presentation materials and
information about how to offer feedback.
For more information about
upcoming webinars, please visit
ModernHealthcare.com/webinars
WEBINAR THANK YOU FOR ATTENDING
Cybersecurity and the New Age of Hackers
Thanks also to our panelists:
Gary Barnes
CIO
Medical Center
Health System
Odessa, Texas
Dr. John Halamka
CIO, Beth Israel Deaconess
Medical Center, Boston
Vice chair, federal Health
Information Technology
Standards Committee
Joseph Conn
Reporter Modern
Healthcare
Lillian Ablon
Researcher in cybersecurity
and computer
network operations
RAND Corp.
Santa Monica, Calif.

Más contenido relacionado

La actualidad más candente

The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot Site
The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot SiteThe RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot Site
The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot SiteTrimed Media Group
 
Digital health in diabetes: a global perspective
Digital health in diabetes: a global perspectiveDigital health in diabetes: a global perspective
Digital health in diabetes: a global perspectiveYoon Sup Choi
 
What's Next In Connected Health
What's Next In Connected HealthWhat's Next In Connected Health
What's Next In Connected HealthOrthogonal
 
The Life-Changing Impact of AI in Healthcare
The Life-Changing Impact of AI in HealthcareThe Life-Changing Impact of AI in Healthcare
The Life-Changing Impact of AI in HealthcareKalin Hitrov
 
디지털 헬스케어 글로벌 동향: 2017년 상반기
디지털 헬스케어 글로벌 동향: 2017년 상반기디지털 헬스케어 글로벌 동향: 2017년 상반기
디지털 헬스케어 글로벌 동향: 2017년 상반기Yoon Sup Choi
 
Opportunities and Challenges of Mobile Health, Wearables and Sensors for Pharma
Opportunities and Challenges of Mobile Health, Wearables and Sensors for PharmaOpportunities and Challenges of Mobile Health, Wearables and Sensors for Pharma
Opportunities and Challenges of Mobile Health, Wearables and Sensors for PharmaJohn Reites
 
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)Yoon Sup Choi
 
Future of health Care
Future of health CareFuture of health Care
Future of health CareJames Canton
 
Health CIO Network Webinar: Overcoming the Challenges of Clinical Documentation
Health CIO Network Webinar: Overcoming the Challenges of Clinical DocumentationHealth CIO Network Webinar: Overcoming the Challenges of Clinical Documentation
Health CIO Network Webinar: Overcoming the Challenges of Clinical DocumentationNuance Healthcare EMEA
 
Startups Step Up - how healthcare ai startups are taking action during covid-...
Startups Step Up - how healthcare ai startups are taking action during covid-...Startups Step Up - how healthcare ai startups are taking action during covid-...
Startups Step Up - how healthcare ai startups are taking action during covid-...Renee Yao
 
Maheu & Luxton Evidenced Based Apps and Text Messaging Legal and Ethical Str...
Maheu & Luxton Evidenced Based Apps and Text Messaging  Legal and Ethical Str...Maheu & Luxton Evidenced Based Apps and Text Messaging  Legal and Ethical Str...
Maheu & Luxton Evidenced Based Apps and Text Messaging Legal and Ethical Str...Marlene Maheu
 
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...Target Health, Inc.
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HxRefactored
 
Healthcare Unbound Rapchak2010
Healthcare Unbound Rapchak2010Healthcare Unbound Rapchak2010
Healthcare Unbound Rapchak2010brapchak
 
Computing in the Physician's Practice
Computing in the Physician's PracticeComputing in the Physician's Practice
Computing in the Physician's PracticeMatthew Holt
 
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로Yoon Sup Choi
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...IRJET Journal
 
Telemedicine and the Transformation of Primary Care 2020/2021
Telemedicine and the Transformation of Primary Care 2020/2021Telemedicine and the Transformation of Primary Care 2020/2021
Telemedicine and the Transformation of Primary Care 2020/2021Robert Mittendorff, MD, MBA
 
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...Levi Shapiro
 

La actualidad más candente (20)

The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot Site
The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot SiteThe RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot Site
The RSNA Image Share Network: Initial 12 Month Results from the UCSF Pilot Site
 
Digital health in diabetes: a global perspective
Digital health in diabetes: a global perspectiveDigital health in diabetes: a global perspective
Digital health in diabetes: a global perspective
 
What's Next In Connected Health
What's Next In Connected HealthWhat's Next In Connected Health
What's Next In Connected Health
 
The Life-Changing Impact of AI in Healthcare
The Life-Changing Impact of AI in HealthcareThe Life-Changing Impact of AI in Healthcare
The Life-Changing Impact of AI in Healthcare
 
디지털 헬스케어 글로벌 동향: 2017년 상반기
디지털 헬스케어 글로벌 동향: 2017년 상반기디지털 헬스케어 글로벌 동향: 2017년 상반기
디지털 헬스케어 글로벌 동향: 2017년 상반기
 
Opportunities and Challenges of Mobile Health, Wearables and Sensors for Pharma
Opportunities and Challenges of Mobile Health, Wearables and Sensors for PharmaOpportunities and Challenges of Mobile Health, Wearables and Sensors for Pharma
Opportunities and Challenges of Mobile Health, Wearables and Sensors for Pharma
 
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)
인공지능은 의료를 어떻게 혁신할 것인가 (ver 2)
 
Future of health Care
Future of health CareFuture of health Care
Future of health Care
 
Health CIO Network Webinar: Overcoming the Challenges of Clinical Documentation
Health CIO Network Webinar: Overcoming the Challenges of Clinical DocumentationHealth CIO Network Webinar: Overcoming the Challenges of Clinical Documentation
Health CIO Network Webinar: Overcoming the Challenges of Clinical Documentation
 
Startups Step Up - how healthcare ai startups are taking action during covid-...
Startups Step Up - how healthcare ai startups are taking action during covid-...Startups Step Up - how healthcare ai startups are taking action during covid-...
Startups Step Up - how healthcare ai startups are taking action during covid-...
 
Maheu & Luxton Evidenced Based Apps and Text Messaging Legal and Ethical Str...
Maheu & Luxton Evidenced Based Apps and Text Messaging  Legal and Ethical Str...Maheu & Luxton Evidenced Based Apps and Text Messaging  Legal and Ethical Str...
Maheu & Luxton Evidenced Based Apps and Text Messaging Legal and Ethical Str...
 
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...
How eSource Solutions are Impacting Clinical Research Sites, Patients, Regula...
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
 
Healthcare Unbound Rapchak2010
Healthcare Unbound Rapchak2010Healthcare Unbound Rapchak2010
Healthcare Unbound Rapchak2010
 
Computing in the Physician's Practice
Computing in the Physician's PracticeComputing in the Physician's Practice
Computing in the Physician's Practice
 
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로
디지털 헬스케어를 어떻게 구현할 것인가: 국내 스타트업 업계를 중심으로
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...
 
Telemedicine and the Transformation of Primary Care 2020/2021
Telemedicine and the Transformation of Primary Care 2020/2021Telemedicine and the Transformation of Primary Care 2020/2021
Telemedicine and the Transformation of Primary Care 2020/2021
 
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...
mHealth Israel_Hospitals and Healthcare Data_Carol Gomes_Stony Brook Universi...
 
Point of Care Messaging
Point of Care MessagingPoint of Care Messaging
Point of Care Messaging
 

Destacado

Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)U.S. News Healthcare of Tomorrow
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesKurt Hagerman
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0grp362
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical DevicesExtreme Networks
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsHCL Technologies
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizonteam-WIBU
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
 
Cybersecurity for medical devices in the EU
Cybersecurity for medical devices in the EUCybersecurity for medical devices in the EU
Cybersecurity for medical devices in the EUErik Vollebregt
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresUITSEC Teknoloji A.Ş.
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet
 

Destacado (20)

Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
Healthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected MachinesHealthcare's Losing Battle Against the Hyper-Connected Machines
Healthcare's Losing Battle Against the Hyper-Connected Machines
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
10 Ways to Mitigate the Risk and Effect of Cyber Attacks on Medical Devices
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
Securing Medical Devices From Cyber Threats
Securing Medical Devices From Cyber ThreatsSecuring Medical Devices From Cyber Threats
Securing Medical Devices From Cyber Threats
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 
Cyber services IoT Security
Cyber services IoT Security Cyber services IoT Security
Cyber services IoT Security
 
Cybersecurity for medical devices in the EU
Cybersecurity for medical devices in the EUCybersecurity for medical devices in the EU
Cybersecurity for medical devices in the EU
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Cyber Insurance – Did You Know?
 

Similar a Webinar: Cybersecurity and the New Age of Hackers

Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...Matthew J McMahon
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptxradhika457461
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxJohn Donahue
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...Health IT Conference – iHT2
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 

Similar a Webinar: Cybersecurity and the New Age of Hackers (20)

Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
 
Primer for Information Security Programs
Primer for Information Security ProgramsPrimer for Information Security Programs
Primer for Information Security Programs
 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
 
Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Succe...
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 

Más de Modern Healthcare

From Ebola to Zika - What Do Providers Need to Know?
From Ebola to Zika - What Do Providers Need to Know?From Ebola to Zika - What Do Providers Need to Know?
From Ebola to Zika - What Do Providers Need to Know?Modern Healthcare
 
Shifting landscapes: Establishing and maintaining brand identity in an era of...
Shifting landscapes: Establishing and maintaining brand identity in an era of...Shifting landscapes: Establishing and maintaining brand identity in an era of...
Shifting landscapes: Establishing and maintaining brand identity in an era of...Modern Healthcare
 
The power of the story: Using patient testimonials and stories to drive marke...
The power of the story: Using patient testimonials and stories to drive marke...The power of the story: Using patient testimonials and stories to drive marke...
The power of the story: Using patient testimonials and stories to drive marke...Modern Healthcare
 
Joe Public II: Embracing the New Paradigm
Joe Public II: Embracing the New ParadigmJoe Public II: Embracing the New Paradigm
Joe Public II: Embracing the New ParadigmModern Healthcare
 
The tools for success: Leveraging content marketing to engage and inspirefor ...
The tools for success: Leveraging content marketing to engage and inspirefor ...The tools for success: Leveraging content marketing to engage and inspirefor ...
The tools for success: Leveraging content marketing to engage and inspirefor ...Modern Healthcare
 
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...Modern Healthcare
 
Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Modern Healthcare
 
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...Modern Healthcare
 
Workplace Wellness in Flux – Nicolaas Pronk
Workplace Wellness in Flux – Nicolaas Pronk Workplace Wellness in Flux – Nicolaas Pronk
Workplace Wellness in Flux – Nicolaas Pronk Modern Healthcare
 
Opening Keynote Presentation – George Foyo
Opening Keynote Presentation – George Foyo Opening Keynote Presentation – George Foyo
Opening Keynote Presentation – George Foyo Modern Healthcare
 
Closing Keynote Presentation – Craig Deao
Closing Keynote Presentation – Craig Deao Closing Keynote Presentation – Craig Deao
Closing Keynote Presentation – Craig Deao Modern Healthcare
 
Workplace Wellness in Flux – Daniel Timblin
Workplace Wellness in Flux – Daniel Timblin Workplace Wellness in Flux – Daniel Timblin
Workplace Wellness in Flux – Daniel Timblin Modern Healthcare
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)Modern Healthcare
 
Custom webinar slides: Improve operations through standardization
Custom webinar slides: Improve operations through standardizationCustom webinar slides: Improve operations through standardization
Custom webinar slides: Improve operations through standardizationModern Healthcare
 
July 2015 accountable care webinar
July 2015 accountable care webinarJuly 2015 accountable care webinar
July 2015 accountable care webinarModern Healthcare
 
Achieving Sustainable Savings in Purchased Services Through Best Practices
Achieving Sustainable Savings in Purchased Services Through Best PracticesAchieving Sustainable Savings in Purchased Services Through Best Practices
Achieving Sustainable Savings in Purchased Services Through Best PracticesModern Healthcare
 
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...Modern Healthcare
 
Webinar: Leading the Journey - Cultivating Success in Healthcare
Webinar: Leading the Journey - Cultivating Success in HealthcareWebinar: Leading the Journey - Cultivating Success in Healthcare
Webinar: Leading the Journey - Cultivating Success in HealthcareModern Healthcare
 
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...Modern Healthcare
 
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...Modern Healthcare
 

Más de Modern Healthcare (20)

From Ebola to Zika - What Do Providers Need to Know?
From Ebola to Zika - What Do Providers Need to Know?From Ebola to Zika - What Do Providers Need to Know?
From Ebola to Zika - What Do Providers Need to Know?
 
Shifting landscapes: Establishing and maintaining brand identity in an era of...
Shifting landscapes: Establishing and maintaining brand identity in an era of...Shifting landscapes: Establishing and maintaining brand identity in an era of...
Shifting landscapes: Establishing and maintaining brand identity in an era of...
 
The power of the story: Using patient testimonials and stories to drive marke...
The power of the story: Using patient testimonials and stories to drive marke...The power of the story: Using patient testimonials and stories to drive marke...
The power of the story: Using patient testimonials and stories to drive marke...
 
Joe Public II: Embracing the New Paradigm
Joe Public II: Embracing the New ParadigmJoe Public II: Embracing the New Paradigm
Joe Public II: Embracing the New Paradigm
 
The tools for success: Leveraging content marketing to engage and inspirefor ...
The tools for success: Leveraging content marketing to engage and inspirefor ...The tools for success: Leveraging content marketing to engage and inspirefor ...
The tools for success: Leveraging content marketing to engage and inspirefor ...
 
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...
Closing Keynote - Effective Patient Engagement: The Only Path to Achieving th...
 
Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...Webinar: Information Governance - Where is the Healthcare Industry and Where ...
Webinar: Information Governance - Where is the Healthcare Industry and Where ...
 
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...
The Leadership Pipeline: Cultivating Your Organization’s High Potential Emplo...
 
Workplace Wellness in Flux – Nicolaas Pronk
Workplace Wellness in Flux – Nicolaas Pronk Workplace Wellness in Flux – Nicolaas Pronk
Workplace Wellness in Flux – Nicolaas Pronk
 
Opening Keynote Presentation – George Foyo
Opening Keynote Presentation – George Foyo Opening Keynote Presentation – George Foyo
Opening Keynote Presentation – George Foyo
 
Closing Keynote Presentation – Craig Deao
Closing Keynote Presentation – Craig Deao Closing Keynote Presentation – Craig Deao
Closing Keynote Presentation – Craig Deao
 
Workplace Wellness in Flux – Daniel Timblin
Workplace Wellness in Flux – Daniel Timblin Workplace Wellness in Flux – Daniel Timblin
Workplace Wellness in Flux – Daniel Timblin
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
 
Custom webinar slides: Improve operations through standardization
Custom webinar slides: Improve operations through standardizationCustom webinar slides: Improve operations through standardization
Custom webinar slides: Improve operations through standardization
 
July 2015 accountable care webinar
July 2015 accountable care webinarJuly 2015 accountable care webinar
July 2015 accountable care webinar
 
Achieving Sustainable Savings in Purchased Services Through Best Practices
Achieving Sustainable Savings in Purchased Services Through Best PracticesAchieving Sustainable Savings in Purchased Services Through Best Practices
Achieving Sustainable Savings in Purchased Services Through Best Practices
 
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...
From Burnout to Engagement: Strategies to Promote Physician Wellness and Work...
 
Webinar: Leading the Journey - Cultivating Success in Healthcare
Webinar: Leading the Journey - Cultivating Success in HealthcareWebinar: Leading the Journey - Cultivating Success in Healthcare
Webinar: Leading the Journey - Cultivating Success in Healthcare
 
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...
Webinar: Bad Data's Effect on Population Health PerformanceArcadia webinar da...
 
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...
Webinar: Why Hospitalists are Important to Managing Population HealthLp cogen...
 

Último

Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...Russian Call Girls in Ludhiana
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...gragteena
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Niamh verma
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Russian Call Girls Amritsar
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Último (20)

Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 

Webinar: Cybersecurity and the New Age of Hackers

  • 1. WEBINAR WELCOME! Cybersecurity and the New Age of Hackers Gary Barnes CIO Medical Center Health System Odessa, Texas Dr. John Halamka CIO, Beth Israel Deaconess Medical Center, Boston Vice chair, federal Health Information Technology Standards Committee Joseph Conn Reporter Modern Healthcare During today’s discussion, feel free to submit questions at any time by using the questions box. A follow-up e-mail will be sent to all attendees with links to the presentation materials online. Lillian Ablon Researcher in cybersecurity and computer network operations RAND Corp. Santa Monica, Calif. Panelists:
  • 3. WEBINAR NOW SPEAKING Cybersecurity and the New Age of Hackers Please use the questions box on your webinar dashboard to submit questions to our moderator Joseph Conn Reporter Modern Healthcare
  • 4. WEBINAR NOW SPEAKING Cybersecurity and the New Age of Hackers Please use the questions box on your webinar dashboard to submit questions to our moderator Lillian Ablon Researcher in cybersecurity and computer network operations RAND Corp. Santa Monica, Calif.
  • 5. A Cyber Overview: black markets, threat actors, and our increasingly digital landscape Lillian Ablon lablon@rand.org @LilyAblon
  • 6.
  • 7. Data often appears withinData often appears withinData often appears withinData often appears within days on black market sitesdays on black market sitesdays on black market sitesdays on black market sites
  • 8. Ablon - 4 • How do cyber thieves get the tools to steal the data? • What happens to the data after it’s stolen? • What do the markets look like? • How mature are these markets? Report available at: http://www.rand.org/pubs/research_reports/RR610.html
  • 9. Ablon - 5 • Growing and maturing • Increasingly sophisticated • Resilient and adaptive • Easy for buyers to get involved in The markets for cybercrime are: Image Credit: Juniper Networks Report available at: http://www.rand.org/pubs/research_reports/RR610.html
  • 10. Ablon - 6 There are different types of cyber threat actors, each motivated by different things Icons by The Noun Project: Money by Joe Mortelli; Protest by Jakob Vogel; Globe by Tyrus; Cyberterror by Luis Prado, via CC 2.0. Hacktivists State-Sponsored CyberterroristsCybercriminals
  • 11. Ablon - 7 Icons by The Noun Project: Money by Joe Mortelli; Globe by Tyrus State-Sponsored Cybercriminals What can cyber actors do with our stolen health data?
  • 12. Ablon - 8 Icons by The Noun Project: Money by Joe Mortelli; Globe by Tyrus State-Sponsored Cybercriminals • Medical records on the black markets can be worth up to $50 • Harvest email addresses and contact list to conduct phishing attacks • Exploit password re-use • Commit identity theft, tax or medical fraud • Resell prescription medication • Build profiles of possible targets for follow- on surveillance, reconnaissance, and intelligence campaigns • Use data for corporate extortion to blackmail companies who are responsible for data protection What can cyber actors do with our stolen health data?
  • 13. Ablon - 9 Our worlds are digital
  • 14. Ablon - 10 How can we protect ourselves?
  • 15. Reconsider convenience Employ multifactor authentication, encryption, password best practices Be vigilant of newly connected devices and the “Internet of Things” Invest in security from the start
  • 16. Ablon - 12 Lillian Ablon lablon@rand.org @LilyAblon
  • 17.
  • 18. WEBINAR NOW SPEAKING Cybersecurity and the New Age of Hackers Please use the questions box on your webinar dashboard to submit questions to our moderator Gary Barnes CIO Medical Center Health System Odessa, Texas
  • 19. Why do we have that information on the Internet?
  • 20. Who is Responsible for Protecting Your Organization against Cyber Attacks? Have you had a Full Security Audit for Your Organization? And not just a HIPAA Audit! Your Organization has to Offense, not Defense! Daily Huddle to discuss issues, including Malware Response Reports
  • 21. Reasons to be Concerned • Private or sensitive data exposed • Denial of service attacks • Financial losses • Customer records compromised or stolen • Your Organizations Reputation can be effected
  • 22. Cyber Security Life Cycle Yearly
  • 23. External Access – Organization and Contractors Blocking and Thwarting Workstation Infections Safeguarding External Facing Servers Safeguarding Internal Servers Keeping the Workstation Clean Staying Compliant Knowledge Sharing
  • 24. VPN and NAT Access Validated Yearly • Good time to Check BAA (Business Associate Agreements) current and up-to-date • Close access to/from outside entities that no longer have an association • Catch any NAT'ed resources that are no longer used External Access – Org to Org
  • 25. • Block Dangerous World Region traffic from coming in or going out - Russia, China – Both on Firewall and Email systems – Outgoing is important to block - keeps already infected devices from contacting Master Controllers in those regions • DNS Firewall – Keeps devices from going to malware websites or clicking on malicious links – Preventing infections from happening – Disrupting infected clients ability to communicate with Master Controllers Blocking and Thwarting Workstation Infections
  • 26. Safeguarding Externally Facing Servers • Incorporate regular external vulnerability scans into security routine • Stay on top of new vulnerabilities - POODLE, ShellShock • Regularly scan for new devices in external ranges Teams sometimes implement new devices without following procedures
  • 27. • Keeping workstations clean! Patch all software (3rd Party) as well as OS o Cyber-attacks are going after software that usually remains unpatched - Adobe, Java Manage and monitor for patch/antivirus compliance Put mechanism in place to push emergency patches/fixes out quickly Keeping Workstations Clean!
  • 28. Safeguarding Internal Devices Why it’s important! • Internal Cyber-Attacks are increasing! Running regular internal vulnerability scans should be as robust as external vulnerability scans • Put procedures in place to build hardened secure servers • Tune IPS alerts as tightly as possible Send real-time alerts Feel for what is going on in environment
  • 29. Cyber Security Life Cycle Yearly
  • 30. WEBINAR NOW SPEAKING Cybersecurity and the New Age of Hackers Please use the questions box on your webinar dashboard to submit questions to our moderator Dr. John Halamka CIO, Beth Israel Deaconess Medical Center, Boston Vice chair, federal Health Information Technology Standards Committee
  • 32. Major National Incidents • Community Health Systems, Anthem, JP Morgan, Home Depot, Target • Vulnerabilities include Heartbleed, Shellshock, Poodle • In a world of healthcare mergers and acquisitions, you are as vulnerable as your weakest link
  • 33. BIDMC Incidents • 2012 stolen laptop/attorney general consent judgement • 2013 infected radiology workstation/OCR investigation • Our own social engineering efforts
  • 35. Evolving technologies • Malware detection • Analytics - Security Incident and Event Management (SIEM) • Consumer technologies - strong encryption built into endpoints • Ricoh’s healthcare camera • Secure texting applications
  • 36. Building Maturity • The attacks are increasing in number and sophistication • People, Process and Technologies must be addressed in combination • Education is key • Budgets and staff must be increased • Healthcare is behind but enforcement is motivating Boards to prioritize security
  • 37. WEBINAR TODAY’S PANELISTS Cybersecurity and the New Age of Hackers During today’s discussion, feel free to submit questions at any time by using the questions box Gary Barnes CIO Medical Center Health System Odessa, Texas Dr. John Halamka CIO, Beth Israel Deaconess Medical Center, Boston Vice chair, federal Health Information Technology Standards Committee Joseph Conn Reporter Modern Healthcare Lillian Ablon Researcher in cybersecurity and computer network operations RAND Corp. Santa Monica, Calif.
  • 38. Expect a follow-up email within two weeks with links to presentation materials and information about how to offer feedback. For more information about upcoming webinars, please visit ModernHealthcare.com/webinars WEBINAR THANK YOU FOR ATTENDING Cybersecurity and the New Age of Hackers Thanks also to our panelists: Gary Barnes CIO Medical Center Health System Odessa, Texas Dr. John Halamka CIO, Beth Israel Deaconess Medical Center, Boston Vice chair, federal Health Information Technology Standards Committee Joseph Conn Reporter Modern Healthcare Lillian Ablon Researcher in cybersecurity and computer network operations RAND Corp. Santa Monica, Calif.