April 17, 2019 - April 17, 2019
Fremont, California, United States
Conference Description (submitted by organizer)
With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization.
We will first look at what are the different types of risk, threats, and vulnerabilities on ePHI and methods to keep your data secure. We will talk though topics such as why spectre and meltdown while not a problem today, could be the cause of the next big attack. Other attacks such as ransomware, phishing, social engineering, and insider attacks will discussed to help you better understand these threats and what you need to be doing to prevent them. In addition, we will take a brief look at medical device vulnerabilities and the importance of keeping those devices secure.
Vulnerability management will be discussed and how to use it as a valuable tool to keep your organization protected. If your IT department is not deploying patches and updates to your software and infrastructure it could end up be the cause of a breach or worse a ransomware attack.
Having an incident response plan will be critical to not only have, but to have tested so when you do experience a breach or potential attack you know what to do. In addition, we will look at the importance of having a Disaster Recovery / Business Continuity Plan and how it might be necessary to declare a disaster after an incident. After the webinar, you will have the insight to take your cybersecurity program to the next level.