How Can Healthcare Reduce Cyber Risk and Maintain Patient Safety with Proofpoint & Fairview Health
December 1, 2021: Cyber attacks are more sophisticated, more frequent and the potential outcomes are far more devastating. What technology tools can help us detect the presence of those malicious threats within our environment, both in the cloud and on-prem? Jim Brady, VP, Information Security & Infrastructure/Operations and CISO at Fairview Health Services and Ryan Witt, Industries Solutions and Strategy Leader at Proofpoint share crucial security strategies to survive phishing, imposter threats, ransomware, and supply chain attacks. What areas should CIOs focus on to deter risk? How can they address cyber with their Board? And what would you say to those who say “it won’t happen to us”?
00:00:00 – Introduction
00:05:40 – Credentials are the Nirvana state for cybercriminals
00:06:50 – A strong number of attacks are being launched from well-known established data repository sites like Microsoft Office 365 and SharePoint.
00:08:12 – Every email that’s coming in is technically eligible to be a bad email
00:22:35 – Research shows that bad actors are in your environment for up to 6 months before being detected