Digital Identity , Identity & Access Management , Security Operations

Stop Them: Combating Identity Attacks on Your Health System

CrowdStrike Healthcare Executive Insights Webinar

Safeguarding health systems against cyberattacks is a round-the-clock responsibility. 75% of all detections are malware-free activities and involve identity techniques, as analyzed by our CrowdStrike Overwatch team.

What this means is most adversaries are not “breaking in” but are “logging in” oftentimes without being detected by stealing credentials and bypassing unmanaged endpoints to execute an attack.

Listen to this on-demand session where CrowdStrike healthcare executive strategists, Todd Felker and Wael Younan, discuss ways to prevent your health system from identity-related attacks. Together, they explore how cross-domain visibility and enforcement can enable security teams to detect lateral movement, gain comprehensive insight into attack paths, and identify malicious activity.

Key takeaways include:

  • How adversaries are using identity attacks and their impact on healthcare
  • Use of Remote Monitoring and Management (RMM) tools and social engineering tactics
  • Understanding of Access Brokers and their involvement in identity attacks
  • Key methods to identify sophisticated adversary access methods to help prevent and protect against them




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.