Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom Up

  • Webcast Aired Wednesday, 20 Jul 2016 1:00PM EDT (20 Jul 2016 17:00 UTC)
  • Speakers: Hugh Njemanze, Barbara Filkins, Mike Goldgof, Ty Powers

Clinical systems and customer healthcare information are more at risk than ever. This webcast will reveal how healthcare providers are opening up their systems to exchanges, mobile patient applications and other new risks as they continue to struggle to secure their legacy systems and medical devices.

Building on the SANS 2014 survey report on health care cyber security, this webcast will go over the results of our new SANS health care cyber security survey just completed by more than 200 health care IT professionals. In this webcast, we explore drivers, assets targeted, attack vectors, breach histories and concerns related to increased use of mobile and cloud computing, as well as devices and controls in use.

Today's webcast focuses on security from the trenches - including the assets most at risk, breaches against those assets, and how, in particular, cloud and mobile computing are changing the threat landscape. This webcast will explore:

  • Drivers for security programs
  • Assets that are being targeted by adversaries
  • Attack vectors used and how successful they are
  • Response readiness
  • Inhibitors to improving security and response
  • How respondents are addressing concerns raised by increased mobile/cloud computing in the health care environment

Part 2 of this webcast will be held on Thursday, July 21 at 1 PM Eastern. In it, we'll look at health care security from the top down, focusing on management priorities, controls and budgets. Click here to register for Part 2.

Register to attend this webcast to be among the first to receive the associated whitepaper written by Barbara Filkins.