When you’re using a system like Meditech that has a unique architecture, an unanticipated service interruption can be downright catastrophic, said CIOs Rich Temple and Brian Davis, who discussed their recovery strategies.
Does your contracting process have the necessary language and sanctions to protect your organization from ransomware attacks? CISO Mitch Parker sheds light on what the recent Department of Treasury guidance tell us (and what it doesn’t).
A key element in understanding the sanctions risks associated with ransomware payments is in understanding the threat actors and how they operate, says Mitch Parker, CISO at Indiana University Health.
With data no longer confined to a single repository or network that can be locked down, guarding the perimeter simply doesn’t cut it anymore, said our panelists, who discussed the need for a layered approach to data security.
Although the pandemic has presented numerous obstacles for IT and security leaders, it has also presented “an opportunity to test and validate controls,” said Nemi George, who talked about how his team has fared, and shared lessons learned.