Third-party vendors should be supervised rigorously to prevent data breaches and ensure transparency across all organizational levels, according to Jonathan Armstrong, partner, Punter Southall Law. CISOs have to educate their boards on systemic risks, he said.
Ransomware attackers stole files that potentially contain patient and employee data from seven of Ascension's 25,000 servers. The hackers gained access to the organization's network when an employee inadvertently downloaded a file containing malware, said the Missouri-based healthcare system.
Laura Deaner, CISO, Northwestern Mutual, discusses integrating cybersecurity measures to protect client data and trust by prioritizing end-to-end data security and cyber resilience, bolstering third-party risk management platforms and enhancing cybersecurity hygiene methods.
This week, feds counted cyber incidents; Ukraine made arrest; Black Basta seemed to exploit flaw; 51 flaws in Patch Tuesday; SolarWinds, JetBrains patched flaws; Alan Turning Institute debunked paper on AI; Santander wants password changes; Christie's spoke of data breach and cyber pros face burnout.
Cyber resilience has become more crucial than ever. Erwin Eimers, general manager, IT and cybersecurity and CIO/CISO of Sumitomo Chemical America, emphasized the importance of preparing for compromises and breaches, rather than just preventing them.
Cybersecurity workforce development is critical as IT and OT converge. Sean McBride, director of the informatics research institute at Idaho State University, advises organizations to train people with the "skills, attitudes and behaviors" to manage and protect critical systems.
It's critical for CISOs to study what went wrong in major ransomware IT disruptions and breaches hitting the healthcare sector and to look closely within their own organizations for similar gaps or vulnerabilities, said Michael Prakhye, CISO of Adventist HealthCare.
Companies are significantly expanding their SEC cyber risk disclosures as they aim to demonstrate their cybersecurity efforts, instill market confidence and potentially improve stock prices, according to Kayne McGladrey, field CISO, Hyperproof.
The U.S. National Institute of Standards and Technology wants public feedback on the first draft publication of a new project that aims to better secure the water and wastewater sectors from emerging cyberthreats by focusing on common concerns affecting operational technology assets.
Cyber Florida: The Florida Center for Cybersecurity helps enhance cybersecurity resilience by assisting understaffed critical infrastructure entities across Florida. Ambassador Roland Miller emphasized the importance of helping smaller entities improve their cybersecurity defenses.
AI offers significant business benefits but also introduces data privacy risks. According to Harmonic Security's CEO Alastair Paterson, CISOs worry about sensitive data shared with third-party applications. "Our approach is certainly security for AI," he said.
Cybersecurity and risk management work hand in hand to bolster a company's resilience, reducing exposure to potential threats. Dave Johnson, a principal solutions architect at Expel, advises organizations to adopt a holistic approach to cybersecurity to address risks effectively.
Organizations are moving from traditional perimeter-based security to identity-based security. This shift focuses on continuous identity verification rather than assuming internal users are automatically trusted, said Vivin Sathyan, senior technology evangelist, ManageEngine.
Chief Information Security Officers (CISOs) face unprecedented challenges in their efforts to protect their organizations against a rising tide of increasingly sophisticated cyberthreats.
Traditional hiring methods often emphasize educational background and work experience, but the White House is encouraging efforts to transition federal and contractor roles to a skills-based framework. Here's how and why to consider taking this approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.