Kevin Dunnahoo, Associate Director, Protiviti.
April 8, 2019
-
Discover key trends in healthcare cybersecurity, breaches, costs to the industry, and the overall motivation for these attackers to gain access to sensitive information including PHI
-
Describe the anatomy of attacks and security breaches occurring in healthcare, using real world examples and scenarios, covering attacker’s processes for gaining a foothold, privilege escalations, lateral network movement, and data exfiltration tactics
-
Recommend key cybersecurity controls and areas of focus for compliance personnel to team with information security personnel to jointly manage the risks to your organization in a proactive manner