Healthcare Security Pros Prioritize Sharing and Caring in the Wild, Wild West of Healthcare
January 02, 2018, Deborah McLain, Director, Heathcare & Life Sciences, Coalfire
Security professionals from healthcare delivery organizations (HDOs), medical device manufacturers, and pharmaceutical companies gathered in Scottsdale, Arizona for the NH-ISAC Cyber Rodeo Summit last month. The big topics were how to share more threat intelligence, while at the same time ensuring the highest level of patient care and safety.
Look Out! Risk Is on the Move, According to IoT Thought Leaders from Across the Globe
December 19, 2017, Deborah McLain, Director, Heathcare & Life Sciences, Coalfire
The IoT Security Summit 2017 in New York City in late October and the Security of Things World USA 2017 in San Diego last month were both packed with thought leaders from all parts of the IoT ecosystem – device manufacturers, telecom carriers, cloud providers, and early-adopter end users from vertical industries. They came, they saw, and they tried to conquer the many security challenges faced by organizations when implementing IoT initiatives . . . but came away with many unanswered questions.
Black Hat Europe puts cybersecurity on the C-Suite Agenda
December 18, 2017, Andrew Barratt, Managing Director, Europe
Black Hat is renowned for being one of the biggest, most technical security conferences in the world operating in the USA, Europe and Asia. 2017 marks Europe’s first Black Hat Executive summit, a format well received for senior executives to be able to openly discuss cyber security concerns and share business issues arising from cybersecurity deficiencies. Read more
Cybersecurity Incident Response: Three Lessons from Uber’s Story
December 15, 2017, Doug Hudson, Senior Director, Cyber Risk Advisory, Coalfire
The recent news regarding the Uber breach has captured the attention of both the public and legislators. It seems that Uber’s security team discovered a breach, paid a ransom, and didn’t report the matter to company leaders, law enforcement, personnel, or customers.
Deploying and Troubleshooting Compliance Baselines
December 11, 2017, Kyle Snavely, Senior Consultant, Cyber Engineering, Coalfire
If you are in the IT space, you’ve most likely encountered or are bound by some form of regulation/framework such as PCI, HIPAA, FISMA, and/or CGIS. Most of these compliance programs require a hardened baseline to be implemented within your information systems to reduce the risk and impact of an adverse security event. In this post, we’ll take a brief look at building a hardened baseline, examine some tools to assist in a phased approach to deployment, and discuss some common issues that may arise from deploying a system hardening regime.