healthsystemcio.com

healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  • About
    • Our Team
    • Advisory Panel
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advertise
  • Partner Perspectives
  • Subscribe
  • Webinars
    • 10/12-Fighting Insider Breaches
    • 10/17-Improving Patient Communications
    • 10/25-Medical Device Security
    • 10/26-Being Audit-Ready
    • 11/1-Enhancing Email Security
    • On-Demand Webinar Library

  • About
    • Our Team
    • Advisory Panel
    • FAQs/Policies
    • Podcasts
    • Social Media
    • Contact
    • Privacy & Data Protection Policy
    • Terms of Service
  • Advertise
  • Partner Perspectives
  • Subscribe
  • Webinars
    • 10/12-Fighting Insider Breaches
    • 10/17-Improving Patient Communications
    • 10/25-Medical Device Security
    • 10/26-Being Audit-Ready
    • 11/1-Enhancing Email Security
    • On-Demand Webinar Library
Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals — based on their roles and likely access — and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con.

Protecting Your Health System from Imposter-based Emails

Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals — based on their roles and likely access — and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con.
x
On-Demand Content 
  • Full Webinar – Video 
  • Top Take Video Clips
    • Todd Richardson: To get folks to listen to security best practices, you have to make it interesting. Otherwise, “It’s about as dry as talcum powder on a cracker.”
    • Wayne Pierce: “I think the greatest vulnerability comes down to culture.”
    • Ryan Witt: “Never underestimate the patience and due diligence of cybercriminals.”
  • Recap Article
  • Full Webinar-Audio Only: Listen here using the player below or Subscribe
http://media.blubrry.com/healthsystemcio/s3.amazonaws.com/healthsystemcio/audio-video/Imposter-Based-Emails-GB-au.mp3

Podcast: Play in new window | Download ()

Sponsored by 

About our Sponsor: Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Continuing Education Credits: Those holding the CHIME Certified Healthcare CIO credential earn one Continuing Education Unit for each healthsystemCIO webinar attended. Other certification programs, such as those offered by AHIMA and NAHQ/HQCC, may also award CEUs for attending our events. Check with your provider.
 a

On-Demand Webinar Library

Subscribe to Learn of Future Events

Advertising & Marketing Services

Share

Partner Sponsors

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

 

Copyright © 2023 HealthsystemCIO.com.