healthsystemcio.com

healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  • Subscribe
  • Advertise
  • About
    • Our Team
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advisory Panel
  • Webinars
    • 8/9-Application Portfolio Rationalization
    • 8/25-Security for PHI Sharing
    • On-Demand Webinar Library

  • Subscribe
  • Advertise
  • About
    • Our Team
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advisory Panel
  • Webinars
    • 8/9-Application Portfolio Rationalization
    • 8/25-Security for PHI Sharing
    • On-Demand Webinar Library

Devising Defenses to One of Your Top Security Threats: Business Associate Impostor Emails 

03/18/2021 By Anthony Guerra Leave a Comment

Health system employees often deal with dozens of suppliers to get their jobs done. Supply chain staff — because of their engagement with business associates — regularly download files, click links or use third-party applications. Unfortunately, email fraud often starts with the attacker posing as a trusted individual with a legitimate business request, leaving these end users particularly vulnerable and healthcare organizations exposed to theft and emerging cyber risks. In this webinar, we’ll hear from an esteemed group of healthcare leaders who are leveraging a combination of technology, threat intelligence and education to keep their employees from being tricked, and their systems from being breached. We’ll address various topics including:

  • Types of impostor email threats in healthcare
  • Security controls you expect from your expansive supplier network
  • What controls to put in place to ensure your supply chain vulnerability is most protected

Speakers:

  • Steve Dunkle, CISO, Geisinger Health System
  • Christopher Frenz, CISO, AVP of IT Security, Mount Sinai South Nassau
  • Ryan Witt, Managing Director, Healthcare, Proofpoint
https://media.blubrry.com/healthsystemcio/p/content.blubrry.com/healthsystemcio/bec-attacks-proofpoint-webinar-AUDIO-AU.mp3

Podcast: Play in new window | Download ()

Subscribe: Apple Podcasts | Google Podcasts | Spotify | Android | Pandora | iHeartRadio | Stitcher | Podchaser | Podcast Index | Email | TuneIn | RSS

https://media.blubrry.com/healthsystemcio/p/content.blubrry.com/healthsystemcio/bec-attacks-proofpoint-webinar-AUDIO-AU.mp3

Podcast: Play in new window | Download ()

Subscribe: Apple Podcasts | Google Podcasts | Spotify | Android | Pandora | iHeartRadio | Stitcher | Podchaser | Podcast Index | Email | TuneIn | RSS

Share

Related Posts:

  • A Primer On Device Security, Part 3: Detecting and Removing Threats
  • The Good Fight: Positioning Your Organization To Ward Off Security Threats
  • HIMSS Survey Shows Security a Dark Cloud
  • GE Covering Business Suite in Financing Offer
  • Creating A Security Culture

Filed Under: General Interest/Housekeeping Tagged With: Podcast

Share Your Thoughts Cancel reply

You must be logged in to post a comment.

To register, click here.

Content by Topic

Partner Sponsors

 

 

 

.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2022 HealthsystemCIO.com.