Training

Healthcare , Industry Specific , Next-Generation Technologies & Secure Development

The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks

The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks

We are possibly approaching a perfect storm of ePHI vulnerability. As the cyber defenses in other sectors mature, the portability of ePHI and its value increases and easy access becomes available from a host of devices, the opportunity of its theft increases. It's almost impossible to defend against an enemy that you do not understand. Contextual threat intelligence can provide a very detailed picture of who the current threat actors are, how they are currently operating, the types of hacking and fraud services (HaaS and FaaS ) available to them, as well what type of targets they are now selecting. This information when continuously blended into an adaptive defense program can provide a mechanism for Observing the threat, Orienting the threat in the context of your organization, and arriving at Decision upon which to Act (aka the "OODA Loop").

See Also: The Application Security Team's Framework For Upgrading Legacy Applications

There is also startling amount of information about your organization, its assets, personnel and infrastructure readily available to anyone wishing to create a detailed picture of how best to stage an attack. Every organization should gather this Open Source Intelligence (OSINT) information about itself to help understand what the malicious actors know them.

This session will discuss intelligence gathering from both sides of the DMZ and how they can best be utilized to prepare for, and respond to, an attack.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.