The latest edition of the ISMG Security Report analyzes cybersecurity firm McAfee's plans to again become a publicly traded company. Also featured: 'Zero trust' strategic insights and an IoT security flaw saga.
Shopify's announcement this week that two employees inappropriately accessed transactional data from 200 of the merchants that use its e-commerce platform demonstrates the importance of taking a "zero trust" approach to security and improving identity and access management capabilities, security experts say.
How will the future workplace look, and what are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your...
A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced...
The secure access service edge model, or SASE, treats identity as the new perimeter, says Lee Dolsen Singapore-based chief architect for Zscaler in the Asia Pacific region, who offers implementation insights.
Increasingly, cyber attacks are taking advantage of privileged accounts, and traditional PAM controls are not enough to defend against them. Tim Keeler of Remediant discusses the role of Zero Standing Privilege and just-in-time privileged account defense.
As businesses settle into a hybrid world of on-prem, public cloud, private cloud infrastructure with security delivered as a service and all of this overlaid with the concept to Zero Trust, what is left? Companies will have the data they are trying to protect and the identity of the user trying to access something. As...
Our panel will explore of how healthcare sector organizations are approaching zero trust, including:
Best use cases
COVID-19-related deployments
Providing patient access to their health data
"Zero trust" is arguably the cybersecurity buzzword of 2019, but what exactly is it? Is it a tool? Is it a capability? Is it a philosophical journey with no endpoint? Or is it all of the above?
In this exclusive fireside chat, Jack Koons, Chief Cybersecurity Evangelist at Unisys Corporation, will draw upon his...
The shift to cloud has made perimeter-centric view of security obsolete and led to the creation of Zero Trust. With users accessing corporate resources across a variety of devices, platforms and clients, organizations are seeing an increase in phishing, password spray, brute force and other identity based attacks....
The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. Attend...
Security professionals are facing today a reality where the balance between attackers and defenders in the Cyber arena has broken. Attackers have attained a significant advantage, unmatched to the means and security controls that the cyber defenders have developed.
In this session, you will learn:
How to stay...
Learn how the Zero Trust approach to access and authentication mitigates risk of misuse and prevents lateral movement inside a critical IT network. When implementing authentication for the right user at the right time with the right level of privilege, this approach helps organizations keep up with today's hybrid and...
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization...
Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.