Ohad Zaidenberg is the Founder of CTI League, a global cyber threat intelligence community. The Cyber Threat Intelligence (CTI) League is an online, global community of cyber threat intelligence researchers, Infosec experts, CISOs, and other relevant people within the industry, whose goal is to neutralize cyber threats exploiting the current COVID-19 pandemic. Our volunteers prioritize efforts on helping hospitals and healthcare facilities protect their infrastructures during the pandemic and creating an efficient channel to supply these services. In the CTI League platform, volunteers can find a clearinghouse for data, connection network and a platform for facilitating those connections. The CTI League’s current goal is to neutralize cyber threats exploiting the current COVID-19 pandemic. Our volunteers can choose the best path to achieve this goal: takedown the IoC from the internet, triage it to the medical sector or escalate it to the relevant law enforcement agencies. In his day job, Ohad is the Lead Cyber Intelligence Researcher at the ClearSky Cybersecurity, an Israeli cyber threat intelligence company.
Participate in this session to learn how to:
Turn your cameras and microphones on and engage in an interactive discussion on the topic with your peers.
A look at how security can change its role within healthcare organizations from a burden to an accelerator. We will explore the broader role security plays in allowing payers and providers to embrace disruption to provide new patient pathways, improved community health, and open new revenue streams. We will also discuss how robust risk management practices can be refocused to unlock opportunities for optimization, transformation and innovation.
Key Takeaways:
While the proliferation of threat vectors continues to create challenges to CISO’s within the healthcare space, it’s important to recognize that insider threats will remain a serious vulnerability for organizations for the foreseeable future. This session will delve into how a renewed focus on cybersecurity awareness training is a fundamental component of minimizing and containing the huge vulnerability that insider threats pose to long-term cyber resiliency within a healthcare-focused organization.
Participate in this session to gain a better understanding of:
Turn your cameras and microphones on and engage in an interactive discussion on the topic with your peers.
Credential stuffing aimed at account takeover, fake account creation and other brute force attacks drive fraud and abuse that results in more than $40B of hard losses every year. Fraudsters commit large scale bot attacks to steal digital identities and to commit member and provider fraud by stealing wellness rewards and filing false claims. Most companies turn to user friction such as CAPTCHA as a defense which motivated frauders can easily bypass. In this session you will learn how fraudsters launch large scale bot attacks and how you can mitigate these attacks in real-time without the use of CAPTCHA.
Takeaways
· Use real-time solutions to mitigate credential stuffing attacks by bots
· Protect user and provider accounts from identity, rewards and claim fraud
· Increase user login success by removing CAPTCHA
While we have no shortage of data points coming from our tools, CISOs need much more than raw data output to understand how well our security programs are performing. Join me on a journey through the good, the bad and the ugly metrics I have seen throughout my career and a discussion of how to develop meaningful metrics in healthcare environments.
Join this session to:
Turn your cameras and microphones on and engage in an interactive discussion on the topic with your peers.
In a world of risk mitigation, we have vastly enabled video-conferencing and messaging as primary forms of communication in order to diagnose and treat patients. By allowing providers to maximize safety of during crisis, we have had to redefine the status quo. By modernizing consultations, we have been able to handle lower risk health concerns, (e.g. allergies, common cold, flu, etc.) without bogging down clinicians on the front lines. The security challenges that arise from this new digital ecosystem, are ensuring that clinicians are properly recording and submitting all captured data from patient interactions back into their electronic medical record systems. Taking the expanded remote workforce into consideration, additional layers of data protection and cloud application governance will be critical in safeguarding the privacy and safety of our employees, customers, and patients.
We are hyper-focused on cybersecurity more than ever. We need to be. Our business, employees, partners, and customers depend on our ability to see and assess risk so that we can make smart, critical decisions. However, managing hybrid environments that have rapidly spawned from the traditional on-site landscapes to the cloud, combined with the growing number of security products being implemented into our hybrid environments, is not only making our job overwhelmingly complex, but also hindering our ability to see and manage risk.
New and shiny tools continue to be introduced into the market at breakneck speeds. We test and validate, purchase and implement, but that simply isn’t enough. Smart enterprises are shedding this complexity and regaining the visibility and control they need to reliably make smart risk-based decisions.
During this session you will learn how to:
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for cyber-criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization projects must account for these risks in their planning. To mitigate the risks being faced efficiently, healthcare organizations need to adopt a 'zero-trust' security approach and start viewing every threat surface, access point, identity and login attempt as the new security perimeter.
By deploying solutions that can verify users and establish device trust while protecting every application (both cloud and legacy), healthcare organizations can quickly and effectively reduce the threat surface and meet compliance requirements.
Unfortunately, CISO’s often struggle to gain adequate funding to support a truly offensive cybersecurity posture. Both the traditionally tight profit margins within the healthcare space and focus on investment in novel, bleeding-edge clinical technology often take precedent in the healthcare space, leaving CISO’s with a unique challenge when it comes to funding improvements in terms of cyber hygiene.
Offer your experience and insights concerning:
Turn your cameras and microphones on and engage in an interactive discussion on the topic with your peers.