Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Planning for Regional Cyber Incident Response
30/12/2022Hospitals must not only prepare in advance for ransomware and other debilitating attacks on their organizations, but also for responding to the effect of cyber incidents at neighboring facilities, says Dr. Christian Dameff of the University of California San Diego.
-
A Self-Service Platform to Secure Small Businesses
29/12/2022In this episode of "Cybersecurity Unplugged, Stan Golubchik, founder and CEO of ContraForce, discusses the company's mission, beginnings and plans for expansion. Golubchik says ContraForce answers the "need for a stronger generalist workforce for cybersecurity."
-
Improving Recovery From Healthcare Ransomware Incidents
29/12/2022Many healthcare organizations struggle to recover from ransomware attacks, putting clinical procedures and patient safety in jeopardy during the process, says Steve Cagle, CEO of privacy/consulting firm Clearwater. "They need to think about how the technology is supporting the business," he says.
-
Predicting the Cybersecurity Future: Experts Preview 2023
29/12/2022The latest edition of the ISMG Security Report shares tips for security leaders to navigate the threat landscape next year, discusses cybersecurity and privacy policy shifts to watch, and explains why global political and economic instability should not be cause for cybersecurity budgets to drop.
-
Artificial Intelligence and Machine Learning - Present & Future
28/12/2022In this episode of "Cybersecurity Unplugged," Liran Paul Hason, co-founder and CEO of Aporia, discusses the current state of machine learning and artificial intelligence in cybersecurity and the most interesting and promising applications for these technologies right now.
-
How to Reduce Clinician Friction in a Zero Trust Approach
27/12/2022A carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still "raising barriers appropriately" to prevent security incidents, says Dr. Eric Liederman, director of medical informatics and national privacy and security leader at Kaiser Permanente.
-
Why Healthcare Needs to Beef Up Incident Response Plans
26/12/2022Effective testing of incident response plans continues to be a major weakness for many healthcare sector entities, especially those facing ransomware and other disruptive incidents, says Van Steel, a partner at consultancy LBMC Information Security.
-
Advancing Standards-Based, Secure Health Data Exchange
23/12/2022The planned merging of two health data exchange standards organizations - DirectTrust and the Electronic Healthcare Network Accreditation Commission - will help support healthcare sector efforts to advance secure health data exchange, says Scott Stuewe, CEO of DirectTrust.
-
The Core of the Problem With OT Control System Security
23/12/2022In this episode of "Cybersecurity Unplugged," Joe Weiss, managing partner at Applied Control Systems, offers suggestions for how to harden our OT networks today, including what CISOs need to know and how guidance from the federal government needs to change.
-
Ransomware Experts Agree: Don't Buy Data Deletion Promises
22/12/2022The latest edition of the ISMG Security Report discusses why it is always a bad idea for organizations to pay hackers for data deletion, practical steps organizations can and should take to avoid being at the heart of a data subject complaint, and the latest efforts to tackle the ransomware threat.
-
Managing the Evolving Cyber Risk Posed by Third Parties
21/12/2022As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party vendors, says Kathy Hughes, CISO of Northwell Health.
-
Planning for Prolonged Regional Medical Device Outages
15/12/2022A ransomware attack knocking out a medical center's imaging and lab equipment is an incident felt by an entire network of healthcare providers. Entities everywhere should plan for outages even when they don't directly experience an attack, say Aftin Ross of the FDA and Penny Chase of MITRE.
-
Top 5 Tips for Choosing Endpoint Security
15/12/2022After years of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever, which makes it important to take endpoint security to a whole new level. Pat Correia of Cisco Security shares five tips for choosing endpoint security.
-
Palo Alto Founder Nir Zuk on Making the SOC More Autonomous
15/12/2022Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
-
Prosecutors Accuse FTX's Founder of Crypto-Based 'Deception'
15/12/2022The latest edition of the ISMG Security Report discusses how investigators saw the collapse of cryptocurrency exchange FTX as "one of the biggest financial frauds in American history," how CISOs can guard against their own liability, and major security and privacy shifts and the outlook for 2023.
-
Palo Alto's BJ Jenkins on Changing Cloud Needs for Customers
15/12/2022Companies have transitioned since COVID-19 began from lifting and shifting their existing apps to the cloud to entirely rebuilding their applications in cloud-native form. Palo Alto President BJ Jenkins says companies need "shift left" security to get protection as they're coding and building apps.
-
Assessing Cyber Risk, Maturity in Healthcare M&As
14/12/2022When healthcare organizations come together through mergers or acquisitions, it is critical for the entities to carefully assess the cyber risk each poses, as well as its level of cyber maturity, says Jigar Kadakia, CISO and chief privacy officer at Boston-based Mass General Brigham.
-
Nikesh Arora on Palo Alto's Approach to Supply Chain Defense
14/12/2022The $250 million acquisition of Cider Security will allow Palo Alto Networks to secure a piece of code from development to its implementation in a runtime environment. CEO Nikesh Arora says the company must understand the tool sets and open-source widgets coming into the customer's supply chain.
-
Combating Ransomware Attacks: Which Strategies Hold Promise?
14/12/2022Defenders have made strides in disrupting ransomware, but assessing the effectiveness of countermeasures is tough due to a scarcity of information, says cybersecurity veteran Jen Ellis. "We know what the tip of the iceberg looks like, but we don't know what percentage of that iceberg we can see."
-
A Plan to Address Future Healthcare Cyber Challenges
09/12/2022The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.