57 min

Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise‪ ‬ healthsystemCIO.com

    • Technology

They represent the crown jewels for cybercriminals — legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible — such as extensive training and phishing tests — to guard against compromise, it’s not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it’s possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that’s no longer the case. In this timely webinar, we’ll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.

Speakers:



* Jesse Fasolo, Director, Technology Infrastructure & Cyber Security, Information Security Officer, St. Joseph Health

* Michael Shrader, Director (CISO), Information Security, WellSpan Health

* Ryan Witt, VP, Industry Solutions, Healthcare, Proofpoint

They represent the crown jewels for cybercriminals — legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible — such as extensive training and phishing tests — to guard against compromise, it’s not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it’s possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that’s no longer the case. In this timely webinar, we’ll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.

Speakers:



* Jesse Fasolo, Director, Technology Infrastructure & Cyber Security, Information Security Officer, St. Joseph Health

* Michael Shrader, Director (CISO), Information Security, WellSpan Health

* Ryan Witt, VP, Industry Solutions, Healthcare, Proofpoint

57 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron