Cybersecurity and Healthcare

With the numerous data breaches in health care over the last several years, it almost appears that a patient having any expectation of privacy and security of their information is unreasonable. In 2015 alone, tens of millions of personal healthcare records have been hacked into by adversarial nation states and organized crime. Almost daily the headlines document a new cyberattack that is sophisticated and directly targeted at healthcare. Add to these more traditional cybersecurity incidents, the numerous workforce (user) mistakes like losing laptops, backup tapes, and sending unencrypted e-mails and one can legitimately question any realistic expectation of privacy and security in today’s and tomorrow’ digitized healthcare world. Yet, the expectation is based on legal and ethical obligations for health providers to do exactly that—protect the privacy of the information through reasonable and appropriate cybersecurity.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Password changing in IBM Security Secret Server

IBM

In this session, experts from Technical Support will discuss the purpose of the Remote Password Changing feature in Secret Server, as well as how to enable and configure Remote Password Changing, along with a live demonstration.
Watch Now

Cybersecurity: Prime and Subcontractor Responsibilities

Cyber security On-Demand Webinar, cyber-attack On-Demand Webinar, malware On-Demand Webinar

It’s no longer a question of if your cybersecurity will be compromised, but when. Government contractors—both prime contractors and their subcontractors—must understand the federal cybersecurity landscape to ensure compliance with its numerous (and sometimes confusing) requirements.
Watch Now

Creating a Modern Identity Strategy for Hybrid IT Environments

| Sponsored

The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-time deployments and the hardware, softwa
Watch Now

Understanding the Attack Landscape - Your Best Defense in Today’s State of Cyber Security

Alert Logic

As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes. Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.
Watch Now