The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks
We are possibly approaching a perfect storm of ePHI vulnerability. As the cyber defenses in other sectors mature, the portability of ePHI and its value increases and easy access becomes available from a host of devices, the opportunity of its theft increases. It's almost impossible to defend against an enemy that you do not understand. Contextual threat intelligence can provide a very detailed picture of who the current threat actors are, how they are currently operating, the types of hacking and fraud services (HaaS and FaaS ) available to them, as well what type of targets they are now selecting. This information when continuously blended into an adaptive defense program can provide a mechanism for Observing the threat, Orienting the threat in the context of your organization, and arriving at Decision upon which to Act (aka the "OODA Loop").
There is also startling amount of information about your organization, its assets, personnel and infrastructure readily available to anyone wishing to create a detailed picture of how best to stage an attack. Every organization should gather this Open Source Intelligence (OSINT) information about itself to help understand what the malicious actors know them.
This session will discuss intelligence gathering from both sides of the DMZ and how they can best be utilized to prepare for, and respond to, an attack.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.