For organizations that want to ensure safe, scalable, and efficient access to their applications and services, identity is playing a bigger role than ever before. In this session, Mathias Conradt will discuss today's digital environment and how digital transformation is moving up on the agenda for C-level, and what...
With the whole landscape of cybersecurity changing at an ever-increasing pace, today's CISO is faced with addressing talent short falls, emerging threat actors, leveraging new operational models and connected medical devices. The CISO continues to look for a balance of addressing good compute hygiene, searching for...
New York-Presbyterian Hospital CISO Jennings Aske describes his organization's COVID-19 security challenges and response, and the critical lessons learned while dealing with a pandemic in the nation's top hot spot for disease outbreak.
To remain productive and ensure needs are being met, organizations have vastly enabled video-conferencing and messaging as primary forms of communication in order to interact with patients and other healthcare professionals. By redefining the status quo, medical personnel have been able to handle lower risk health...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
Healthcare CISOs across the country were faced with the same challenge at the beginning of 2020: How do we ensure our organizations are secure as our health systems shift to treating a pandemic, supporting a work from home strategy for non-essential employees, and pivot to telehealth? Many already had crisis...
Our panel will explore of how healthcare sector organizations are approaching zero trust, including:
Best use cases
COVID-19-related deployments
Providing patient access to their health data
Bil Harmer, CISO and Chief Evangelist at SecureAuth and Dan Dunstedter, Data Security/HIPAA Security Officer of Phelps Health, discuss why security teams need to increase the level of protection used to secure valuable and highly sensitive information and how they have implemented the highest level of authentication...
The Advanced Persistent Threat (APT) is extremely dangerous to the national and economic security. To address this reality in the 21st century, the one-dimensional protection strategy focused solely on perimeter-based defenses must be transitioned to a new multidimensional, defense-in-depth protection strategy that...
Many healthcare providers are challenged to protect a vast attack surface and hunt for threats with very limited resources. Especially during trying times, ensuring consistent operation across networked medical devices and the security of protected health information is critical. Cyber threats affecting healthcare...
As enterprises take on the COVID-19 pandemic, head-on, maintaining digital distancing, cybercriminals have lost no opportunity to exploit fears around it and enhanced their invasions against enterprises. The eternal vigilance and monitoring of the communication and data flow to become more critical, so also the need...
The COVID-19 pandemic has led to a shift to a remote workforce, speeding adoption of mobile and cloud technologies. Ensuring securing for a workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services from outside corporate networks is proving challenging.
In...
Digital transformation is no longer a choice for organizations. With most organizations anticipating a remote working set up for the rest of the year, how can they ensure frictionless security? With traditional NGFWs proving to be insufficient, organizations are now exploring other avenues. A 'zero trust' approach can...
Over 52% of organizations have already started redesigning their security infrastructures based on the "zero trust" model, and 18% are planning to initiate the effort in the coming year. But keeping your business data protected in a "perimeter everywhere" environment requires more than just a patchwork security...
COVID-19, as you all know is driving new technological demands for enterprises as businesses are dealing with the needs of a sudden, remote workforce and increasingly embracing mobile, cloud, and edge computing. Against this, Zero Trust principals for information security have become one of the main cybersecurity...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.