Due to their multi-vector nature, defending against sophisticated cyber heists launched as Advanced Persistent Threats, or APTs, requires seamless configuration and integration of solutions across your digital estates. With critical assets like consumer-facing applications, SWIFT and ATM servers, BFSIs are a prime target for APTs, as demonstrated by the Cosmos bank cyber heist.
Join us to learn:
The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions of dollars each year and things are just getting worse. As these attacks intensify and become more refined, technology is failing to keep up and your users will continue to fall prey. To effectively defend yourself against this, you have to understand how the attacks work, including the psychological triggers and tricks the attackers are using. This session will explore the different levers that social engineers and scam artists pull to make your users more likely to do their bidding.
You’ll learn fun and engaging examples of mental manipulation in everyday life: from the tactics used by common criminals, to sophisticated social engineering and online scams. Additionally, he'll look at how you can ethically use the very same levers when educating your users.
Healthcare is certainly not immune to the ambiguity that arises with the proliferation of digital identities associated with both human beings themselves and connected devices. As the healthcare industry embarks in its own path of digital transformation, CISO’s are tasked with navigating a complex framework of persistent on-prem sets of applications, a rapidly expanding set of cloud applications, and variety of medical device and cloud-based medical services.
Join this session to gain insights into:
Fighting cybercriminals in the corporate realm ensure potential career opportunities. As cyber threats evolve, efforts must be made to build cyber risk into overall business models to detect, prevent, and thwart bad actors. CEOs invest a considerable amount of time into understanding the fiscal initiatives set forth by the CFO to ensure healthy financial outcomes. The same considerations must be given for CISO’s to integrate cybersecurity measures and risk management fully. The absolute key to CISO success rests on the entire executive team. Their attitude and actions tend to make or break CISO’s.
In this session, you will:
It takes constant monitoring and maximum use of data to find attacks and abnormal behavior before an incident occurs. However, the world produces over 2.5 quintillion bytes of data every day, and 80% of it is unstructured. What this means is most of it's expressed in natural language – spoken, written or visual – that a human can easily understand but traditional security systems can't. Most challenging security problems still require people to make sound decisions about what to act on and what's a false alarm. Building security instincts and expertise into new defenses that analyze research reports, web text, threat data, and other security-relevant structured and unstructured data. Just like security professionals do every day – but at a scale, we've never seen.
In this session, you will:
The consumerization of healthcare is having profound, long-ranging consequences throughout the continuum of care. As a growing number of patients are experiencing a heightened share of financial reasonability, CISO’s should be prepared to meet consumer’s shifting expectations concerning the security and governance of their PHI and HIP.
Topics explored include:
The explosion of medical devices is, perhaps, the most pressing challenge that cybersecurity executives will be facing in the next few years. Despite the promise that IoMT connected devices brings in terms of both patient care and engagement, their propagation will be accompanied by a substantial increase in the scope of the attack surface. This session will delve into how a major medical device manufacture is pioneering innovation as a means of improving cyber security.
Participate in this session to gain insights into:
The current public health situation has serious implications for a healthcare organization’s attack readiness and, left unchecked, could have an impact on both business and clinical continuity. This session will delve into some of the unique parallels between potential disruptions in healthcare delivery/supply chains and the anticipated effects of a large-scale cyber-attack. Join a leading CISO in this session to strategize as to how to develop a proactive, risk-focused strategy to protect business operations and sensitive patient data in the face of the possibility of a global pandemic.
Participate in this session to:
Over the past decade, digitization has become an integral part of the clinical experience as well as the administrative processes employed in the healthcare sector. This shift has dramatically increased the vulnerabilities and attack vectors that CISO’s are tasked with identifying and mitigating. Yet, CISO’s are being asked to greatly scale up their operations with a lack of both human and financial capital. Although AI promises to help solve some of these critical issues, this session will seek to identify strategies being employed to identify appropriate use cases and ensure
Hear how your peers are:
Unfortunately, CISO’s often struggle to gain adequate funding to support a truly offensive cybersecurity posture. Both the traditionally tight profit margins within the healthcare space and focus on investment in novel, bleeding-edge clinical technology often take precedent in the healthcare space, leaving CISO’s with a unique challenge when it comes to funding improvements in terms of cyber hygiene.
Offer your experience and insights concerning: