Digital Identity , Identity & Access Management , Security Operations
Stop Them: Combating Identity Attacks on Your Health System
CrowdStrike Healthcare Executive Insights WebinarSafeguarding health systems against cyberattacks is a round-the-clock responsibility. 75% of all detections are malware-free activities and involve identity techniques, as analyzed by our CrowdStrike Overwatch team.
What this means is most adversaries are not “breaking in” but are “logging in” oftentimes without being detected by stealing credentials and bypassing unmanaged endpoints to execute an attack.
Listen to this on-demand session where CrowdStrike healthcare executive strategists, Todd Felker and Wael Younan, discuss ways to prevent your health system from identity-related attacks. Together, they explore how cross-domain visibility and enforcement can enable security teams to detect lateral movement, gain comprehensive insight into attack paths, and identify malicious activity.
Key takeaways include:
- How adversaries are using identity attacks and their impact on healthcare
- Use of Remote Monitoring and Management (RMM) tools and social engineering tactics
- Understanding of Access Brokers and their involvement in identity attacks
- Key methods to identify sophisticated adversary access methods to help prevent and protect against them