<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Webcast with John Bambenek: Dangerous Lessons Learned from 2018's Healthcare Breaches

hospital-heart-monitor-712_0_0

Photo Cred: Healthcare IT News

Webcast: Dangerous Lessons Learned From 2018's Healthcare Breaches

Wednesday, October 10th. 10 AM - 10:45 AM PDT. 

If you're in the healthcare industry, please do not miss this one.

Not many industries can say that cyber security is a life-and-death issue, except for healthcare institutions. Equipment that we have come to rely on to diagnose critical illnesses and provide life support are now embedded with computers that can’t easily be modified. Electronic Health Records have provided new, unique risks that now must be dealt with.

This webcast will cover this past year’s healthcare breaches to find out what could have been done to prevent those attacks. Plus, what we can now do to protect those devices that, due to FDA regulation, can’t be modified. 

Main Takeaways: 

  • Summarize the high-profile healthcare breaches effecting organizations around the world and what lessons can be drawn from what happened. 
  • Understand the unique threats to healthcare and why older threats still persist against healthcare targets. (Ransomware, for instance) 
  • Discuss protection and mitigation techniques with a focus on embedded medical devices that can’t be modified.

Save Your Spot

Worst Health Care Data Breaches Uncovered in 2018_PNG

             

About the Speaker:

johnspeakingJohn Bambenek is the Vice President of Security, Research and Intelligence at ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cyber criminals, some of which have led to high profile arrests and legal action.

He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter