Hi [[ session.user.profile.firstName ]]

More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide

Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

Specifically, the distinguished panel will focus on:
• Recent trends in healthcare cyber threats and breaches
• HHS guidance on “ransomware and medical equipment patching”
• Recent HIPAA enforcement activities by the HHS that are potentially game changing.

The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
Recorded Sep 27 2016 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health
Presentation preview: More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • RASP has your WAF's back: Protect against zero days by default Nov 5 2019 7:00 pm UTC 44 mins
    Drew Roy, Imperva AppSec Product Manager and Andrew Johnson, Imperva RASP Product Manager
    With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATOs and known technical attacks. RASP sits within your app protecting against known and zero day vulnerabilities in your code - with no signatures and no learning mode.

    Join Drew Roy and Andrew Johnson from the RASP Product team at Imperva to learn how adding RASP to your existing WAF strengthens your security posture and lower your overall risk.
  • How FinServ can Balance Digital Transformation, Risk and Compliance Oct 29 2019 3:00 pm UTC 60 mins
    Terry Ray, SVP and Imperva Fellow, Imperva
    Market fragmentation, the influx of modern digital solutions by fintechs, and the foray into the banking world by tech giants, are all intensifying competition for financial firms, placing them under immense pressure to adopt cloud technology and transform their businesses.

    However, digital transformation also creates new levels of risk as there are now more users interacting with more apps and data that resides everywhere. Moreover, firms continue to face the challenges of complying with increasingly complex regulation and maintaining operational performance while protecting their assets from internal and external threats.

    This webinar explores how you can maintain the balance between risk mitigation, compliance and business transformation.

    What you will learn from this webinar:
    What are the common challenges faced by financial services firms as they embrace digital transformation?
    Why do breaches still happen? – The shortcomings of relying on traditional perimeter-based and identity-based security.
    What is the right approach to assess risk? Why is this recommended by leading analyst firms?
  • Live DDoS Attack: Mitigate then Investigate Oct 23 2019 5:00 pm UTC 60 mins
    David Elmaleh, Product Manager, Imperva and Andrew Shoemaker, Founder & CEO, NimbusDDOS
    Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live layer 7 DDoS attack which showcases how these attacks can be the most difficult to mitigate, and get a closer look at real-world DDoS incidents where threat preparedness was overlooked. Plus, you will learn how to investigate and understand the components of a DDoS attack so that when – not if – a DDoS attack hits, you’re prepared to answer any questions that come your way.
  • Gain rapid threat protection with automated DDoS and WAF solutions Recorded: Oct 9 2019 46 mins
    Josh Hammer, AWS Security Architect; Kim Lambert, Imperva Sr. Product Manager; Aaron Blakely, DigiCert Security Director
    Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated.

    Join our webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business operations.
  • Bad Bots, Big Business: The impact of malicious bots on e-commerce sites Recorded: Oct 1 2019 57 mins
    Edward Roberts, Director of Product Marketing at Imperva and David Pollitt, Head of IT Services and Ops at Missguided
    E-Commerce businesses are bombarded with specialized bot attacks—more often than you probably realize. Most IT pros have experienced the craziness and utter chaos that ensues as malicious bots attack with persistence. The lack of visibility, the time spent researching the origins and patterns, and the immense time pressure to find a solution all curb your ability to serve your company's needs.

    All industries are under attack from bots. But you need to know the tactics used on e-commerce organizations like yours—tactics like price scraping, sneaker bots, grinch bots, and gift card stuffing and abuse.

    In this webinar, we’ll discuss the high-level statistics and key takeaways from our upcoming report on the threat of bad bots toward e-commerce sites, including:

    • The economic impact of
    • Bots that stuff gift cards and scrape the web for investments
    • Bad bots like Grinch bots and Sneaker bots that steal your sales
    • Who’s behind these bad bots
    • There are four primary groups of where bad bots are coming from!
    • The types of attacks they’re using
    • How your customers are affected
    • Hint: bad bots can cause ATOs
    • What you can do about it

    Up your reporting game to beat bad bots. Register now.

    Distil Networks was recently acquired by cyber security software and services company Imperva. Imperva is the industry leader in DDoS, RASP and WAF. With Distil Networks, we now add industry leading Bot Management to the only full stack App Security solution on the market.
  • API Security: Discover Complete Visibility Throughout Your API Endpoints Recorded: Sep 18 2019 27 mins
    Ziv Grinberg, Imperva Principal Product Manager, API Security and Michael Wright, Imperva Senior Product Marketing Manager
    Gartner predicts that by 2022, API abuse will become the most frequent attack vector resulting in data breaches for enterprise web applications. Join our API Security Principal Product Manager, Ziv Grinberg and Senior Product Marketing Manager Michael Wright as they discuss and showcase how Imperva is leading the fight against cybercriminals and the threat they pose to APIs. During this webinar our team will demonstrate the simplicity of uploading a Swagger file, how our API Security solution automatically enforces a positive security model based on the OpenAPI Specification file and in turn empowers your DevOps teams with the confidence and agility they need to publish and secure their APIs.
  • Simple Security Licensing For The Cloud Era: Introducing Imperva FlexProtect Recorded: Jul 9 2019 2 mins
    Dvir Shapira, VP of Product Management; George McGregor, VP of Product Marketing and David Gee, CMO
    FlexProtect is a simple and predictable way to secure your entire environment whether its on-premises, in the cloud or hybrid.
  • Security Analytics wird begehrteste Lösung (nur auf Englisch verfügbar) Recorded: Jun 20 2019 59 mins
    Sara Pan, Sr. Product Marketing Manager and Mark Bouchard, COO, Cyber Edge Group
    Wissen Sie, welche Sicherheitsansätze Ihre Peers beim exponentiellen Wachstum von Sicherheitsdaten verfolgen? Sie wissen, dass sich Bedrohungen ständig weiterentwickeln. Aber wissen Sie, wie sich Ihre aktuelle Aufstellung im Bereich der Cybersicherheit im Vergleich zu denen Ihrer Peers entwickelt? In diesem Live-Webinar werden CyberEdge und Imperva über die Herausforderung und Lösung sprechen, die die überwältigende Menge an Sicherheitsdaten darstellt. Das Ausmaß der eingesetzten Cybersicherheitslösungen und andere wichtige Erkenntnisse aus dem Cyberthreat Defense Report 2019 werden auch behandelt.

    Besuchen Sie dieses Webinar und erhalten Sie Antworten auf Ihre drängendsten Fragen:
    - Haben wir Lücken in unserer Abwehr von Cyberbedrohungen?
    - Welche anderen Ansätze verfolgen meine Peers bei Cyberbedrohungen und den Möglichkeiten, sich gegen sie zu verteidigen?
    - Was gibt unsere Sicherheitsabteilung im Vergleich zu anderen Unternehmen aus?
    - In welche Sicherheitstechnologien sollten wir als nächstes investieren?
  • Security Analytics(英語版のみ)が最も求められるソリューションに Recorded: Jun 20 2019 59 mins
    Sara Pan, Sr. Product Marketing Manager and Mark Bouchard, COO, Cyber Edge Group
    セキュリティデータの急増に伴い、同業者がどのようなセキュリティ対策を講じているかご存知ですか? サイバー脅威の環境は絶えず進化を遂げていますが、自社の現在のサイバーセキュリティ防御態勢が同業者に太刀打ちできるかどうか確信がありますか? このウェビナーでは、膨大な数のセキュリティデータ、配備されているサイバーセキュリティソリューションの範囲など、2019サイバー脅威防御レポートによる主要な洞察から浮かび上がった課題と解決策についてCyberEdgeとImpervaが解説します。

    このウェビナーに参加して、差し迫った問題の回答を見つけてください。
    - サイバー脅威に対する防御にセキュリティギャップが存在しないか?
    - サイバー脅威とその防御策の選択肢について同業者はどのように考えているか?
    - 他の組織と比べてセキュリティ関連の支出はどうか?
    - 次に投資すべきは、どのセキュリティテクノロジーか?
  • Die 5 besten Verfahrensweisen für mehrschichtige Verteidigung Recorded: Jun 18 2019 55 mins
    Amy DeMartine: Principal Analyst, Forrester. Terry Ray, SVP & Fellow, Imperva. Kunal Anand, CTO, Imperva
    Anwendungen sind das Lebenselixier von Unternehmen, aber sie zu schützen, ist eine massive Herausforderung, die sich mit zunehmender Häufigkeit und Anzahl der Bedrohungen vervielfacht. Angesichts der Probleme, die mit dem Umzug von Anwendungen in die Cloud verbunden sind, mit Open-Source-Code, der Implementierung von schnellen Release-Zyklen und der Notwendigkeit, alte Apps zu verwenden, lange nachdem das Entwicklerteam, das sie gebaut hat, weg ist, ist leicht zu sehen, dass die Anwendungssicherheit unendlich viel Arbeit machen kann.

    Wir stehen seit Jahren an vorderster Front und finden heraus, was funktioniert und was nicht. In diesem englischsprachigen Webinar werden wir bewährte Verfahren vermitteln, die Unternehmen jeder Größe dabei helfen, das heikle Problem der Anwendungssicherheit zu lösen. Hier ein kleiner Einblick:

    - Eine Kombination von Verteidigungen an der Schnittstelle, im Netz und innerhalb der Anwendungen selbst macht den Unterschied.
    - Volle Echtzeit-Sichtbarkeit mit Analysen hilft überlasteten Sicherheitsanalysten, reale Bedrohungen schnell vom Rauschen zu unterscheiden.
    - Ein Verbrauchsmodell ermöglicht es dem Unternehmen, Schutzmaßnahmen schnell, einfach und kostengünstig dorthin zu verlagern, wo sie am meisten Gutes bewirken werden.

    Plus weitere Einblicke von Branchenveteranen, die Ihnen helfen, die.
  • アプリケーションを多層防御するための5つのベストプラクティス Recorded: Jun 14 2019 55 mins
    Amy DeMartine: Principal Analyst, Forrester. Terry Ray, SVP & Fellow, Imperva. Kunal Anand, CTO, Imperva.
    アプリケーションは企業の生命線ですが、アプリケーションを保護することは、脅威の頻度と件数が増大するにつれ、さらに困難さを増しています。アプリケーションをクラウドに移行し、オープンソースのコードを使用し、迅速なリリースサイクルを導入し、実際に開発を担当した開発チームがいなくなった後もずっとレガシーアプリの使用を続けざるを得ないことに関連する問題を考慮すると、アプリケーション・セキュリティが終わりのない課題であることは容易に想像できます。

    当社は長年にわたり最前線で、うまくいく施策とうまくいかない施策を見いだしてきました。この英語版のWebセミナーを通じ、あらゆる規模の企業がアプリケーション・セキュリティという重大な問題に対抗できるベストプラクティスを共有します。以下の概要をご参照ください。

    - エッジ、ネットワーク、アプリケーション内での防御を組み合わせることで、効果的な防御が実現します。
    - アナリティクスによるリアルタイムの包括的な可視化機能を活用すると、対応に苦慮するセキュリティ・アナリストは迅速に脅威とノイズを区別できます。
    - セキュリティ・サービスの活用モデルを通じて、企業は迅速・簡単・経済的に防御機能を最も効果的な場所に適用することができます。

    さらに、業界で長い経験を持つ専門家の優れた洞察を活用することで、アプリケーションのセキュリティと是正策を大幅に改善し、有効なDevSecOpsモデルを導入できます。
  • Exec Talk: Working With Security Leader, Imperva Recorded: Jun 11 2019 2 mins
    Kunal Anand, Imperva CTO and David Gee, Imperva CMO
    Imperva is evolving to continue to be the defender of your business growth.
  • RASP has your WAF's back: Protect against zero days by default Recorded: Jun 4 2019 45 mins
    Drew Roy, Imperva AppSec Product Manager and Andrew Johnson, Imperva RASP Product Manager
    With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATOs and known technical attacks. RASP sits within your app protecting against known and zero day vulnerabilities in your code - with no signatures and no learning mode.

    Join Drew Roy and Andrew Johnson from the RASP Product team at Imperva to learn how adding RASP to your existing WAF strengthens your security posture and lower your overall risk.
  • Migrating to the Cloud Safely & Securely - Imperva Part 3 Recorded: May 23 2019 58 mins
    Shawn Ryan, Sr. Product Marketing Manager, Imperva; Brandon Dunlap (Moderator)
    Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
  • Risk Buydown: Why Data Security is a Must Recorded: May 1 2019 64 mins
    Rik Turner, Principal Analyst, Ovum and Sara Pan, Sr Product Marketing Manager, Imperva
    With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well-established, securing data itself must be front and center of enterprise strategy. As threat actors continue to find ways through the corporate edge and to hijack the accounts of legitimate users, protecting sensitive data and ensuring that authorized data activity is appropriate are the cornerstones of mitigating risk.
    Watch this webinar and learn:
    •What is the most effective way to mitigate data breach risks
    •Why does security have to be data-centric
    •What are the shortcomings of perimeter-based security and IAM tools
    •How to enhance perimeter security, IAM, DLP, SIEM with modern database security
  • Buying Down Risk in the New World of App Development - Imperva Part 2 Recorded: Apr 25 2019 47 mins
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Security Analytics becomes Most-Wanted Solution Recorded: Apr 10 2019 59 mins
    Sara Pan, Sr. Product Marketing Manager and Mark Bouchard, COO, Cyber Edge Group
    With exponential growth of security data, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the challenge and solution for the security data avalanche, the extent of cyber-security solutions deployed, and other key insights from the 2019 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    -Do we have gaps in our cyberthreat de­fenses?
    -How are my peers thinking differently about cyberthreats and the options for defending against them?
    -How does our security spend compare to other organizations?
    -Which security technologies should we be investing in next?
  • Best Practices for Mitigating Data Breach Risk - Imperva Part 1 Recorded: Mar 28 2019 57 mins
    Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
    Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
  • Five Best Practices for Application Defense in Depth Recorded: Mar 27 2019 55 mins
    Amy DeMartine: Principal Analyst, Forrester. Terry Ray, SVP & Fellow, Imperva. Kunal Anand, CTO, Imperva.
    Applications are the lifeblood of enterprise, but protecting them is a massive challenge that multiplies as the rate and volume of threats increase. Layer in the issues associated with moving applications to the cloud, using open source code, implementing rapid release cycles, and being forced to use legacy apps long after the development team that built them is gone, and it’s easy to see that application security can be an endless job. We’ve been on the front lines for years, finding what works and what doesn’t. In this webinar we’ll share best practices that will help enterprises of any size tackle the thorny problem of application security. Here’s a sneak peak:

    - A combination of defenses at the edge, in the network and inside the applications themselves make all the difference.
    - Full, real-time visibility with analytics help beleaguered security analysts quickly distinguish real threats from noise.
    - A consumption model allows the enterprise to quickly, easily and cost-effectively move protections to where they will do the most good.

    Plus more insights from industry veterans that will help you vastly improve application security, remediation, and deploy a DevSecOps model that works.
  • Cyber Security Battles: How to Prepare and Win Recorded: Mar 6 2019 45 mins
    Shahrokh Shahidzadeh (Acceptto), George McGregor (Imperva), Avishai Wool (Algosec), Chris Morales (Vectra)
    What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years.

    Join this interactive Q&A panel with security experts to learn more about:
    - The current state of cybersecurity and AI
    - How to deploy AI to detect malware
    - What is adversarial AI (or offensive AI) and how to protect against cyber attacks
    - Preparing for battle
    - What's needed to build an AI system and how to build one that can be used to bypass other AI systems
    - How to fight adversaries that have better resources
    - Protecting against nation state attacks
    - Lessons and recommendations for a more resilient enterprise
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide
  • Live at: Sep 27 2016 5:00 pm
  • Presented by: Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health
  • From:
Your email has been sent.
or close