CISO Insights

Back to Vendor Listings

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part Two

In this three-part series, Academic Healthcare CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world-class prevention program. Read part one. As a preamble to this list of key considerations and best practices, let me first say that all organizations should plan to be attacked.  While there may…

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part One

In this three-part series, Academic Health care CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world class prevention program. Ransomware has been the buzzword du jour for the past year in computer security.  This mostly unsophisticated attack type uses deception and already-existing means of communication to destroy…

Will Corporate Security Models Move Toward the EDU Security Model?

No network is impenetrable, a reality that business executives and security professionals alike must accept. The traditional perimeter focused approach to cybersecurity has often failed to prevent intrusions, especially in an application-focused paradigm. While prevention is crucial, timely incident detection of anomalous behaviors for data ex-filtration are key. Continuous monitoring assumes the attackers are already…

Making Insurance Part of Your Enterprise Risk Management Program – Part Three

In this series, Grace Crickette provides C-Level executives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability policy. Part One Part Two Part Three: Risk Management and Insurance Basics Insurance and Risk Management Basics Insurance is just one tool in the Risk…