- Two free ways to get a Perplexity Pro subscription for one year
- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- The 25+ best Black Friday Nintendo Switch deals 2024
- Why there could be a new AI chatbot champ by the time you read this
- The 70+ best Black Friday TV deals 2024: Save up to $2,000
Devising Defenses to One of Your Top Security Threats: Business Associate Impostor Emails | healthsystemcio.com
Health system employees often deal with dozens of suppliers to get their jobs done. Supply chain staff — because of their engagement with business associates — regularly download files, click links or use third-party applications. Unfortunately, email fraud often starts with the attacker posing as a trusted individual with a legitimate business request, leaving these end users particularly vulnerable and healthcare organizations exposed to theft and emerging cyber risks. In this webinar, we’ll hear from an esteemed group of healthcare leaders who are leveraging a combination of technology, threat intelligence and education to keep their employees from being tricked, and their systems from being breached. We’ll address various topics including:
- Types of impostor email threats in healthcare
- Security controls you expect from your expansive supplier network
- What controls to put in place to ensure your supply chain vulnerability is most protected
Speakers:
- Steve Dunkle, CISO, Geisinger Health System
- Christopher Frenz, CISO, AVP of IT Security, Mount Sinai South Nassau
- Ryan Witt, Managing Director, Healthcare, Proofpoint
Podcast: Play in new window | Download ()
Subscribe: Apple Podcasts | Google Podcasts | Spotify | Android | Pandora | iHeartRadio | Stitcher | Podchaser | Podcast Index | Email | TuneIn | Deezer | RSS
Podcast: Play in new window | Download ()
Subscribe: Apple Podcasts | Google Podcasts | Spotify | Android | Pandora | iHeartRadio | Stitcher | Podchaser | Podcast Index | Email | TuneIn | Deezer | RSS