Hi [[ session.user.profile.firstName ]]

Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management

Healthcare organizations continue to make headlines as the target of cyberattacks, ransomware threats and the source of large data breaches. Yet according to the latest “Healthcare IT Security and Risk Management Study” conducted by HIMSS Analytics, while investments are being made and more focus is being placed around cyber security, it is still viewed as IT problem, rather than as a business risk management issue.

Join us for the “Operationalizing Cybersecurity in Healthcare” webinar as we reveal findings from the study and what healthcare leaders can do to address these gaps and shift their organization from a tactical and reactive mindset to a robust and sustainable risk-management program.

During this webinar, we will also discuss:

• How IT, Security, Business, and Clinical leaders are approaching cybersecurity readiness and the role it has as part of their risk management strategy

• What’s driving the decisions on where cybersecurity investments are being made

• Critical steps to achieving a comprehensive cybersecurity strategy

Register Today
Recorded Mar 14 2017 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance
Presentation preview: Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management
  • Channel
  • Channel profile
  • The Importance of Building Your Zero Trust Program on a Solid Platform Feb 26 2019 6:00 pm UTC 60 mins
    Gerry Grealish, Symantec and Salah Nassar, Symantec
    Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides.

    The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation.

    Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging.

    Join us in this webinar where we’ll look at:

    • Requirements for adopting a Zero Trust model across the entire security stack

    • Key considerations as you plan your Zero Trust programs

    • Benefits of a platform versus fragmented approach

    You’ll gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it.

    Please Join Us, Register Today
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Feb 14 2019 7:00 pm UTC 43 mins
    Sameer Vasanthapuram, Kevin Stultz and Paul Hortop
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • Symantec Control Compliance Suite 12.5 Feb 12 2019 6:00 pm UTC 60 mins
    Suresh Ramkumar, Principal Product Manager, Symantec
    Symantec Control Compliance Suite 12.5 is here!

    Please join us for a special webcast on Tuesday, February 12 to learn more about this exciting release.

    We will discuss and demo some of the cool new features such as

    •Support for REST APIs to enable integration and automation around commonly used functionality like assets, jobs and standards management

    •Support for offline data collection with CCS agents to enable usage in air-gapped networks

    •Integration with BMC Remedy for ticketing by leveraging CCS APIs and the Symantec Workflow Engine

    Don't miss this great opportunity to get the latest information on Control Compliance Suite 12.5!
  • Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear Jan 30 2019 6:00 pm UTC 42 mins
    Adam Glick, Effectiveness Team Lead, Symantec
    Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear.

    Key Learning Objectives:

    - Get an overview of the MITRE ATT&CK framework

    - See how Symantec EDR’s Advanced Attack Detections and MITRE ATT&CK support work together to expose threats

    - Learn how an integrated single agent approach to prevention, detection and response can stop even the most stealthy attack methods

    Please Join Us, Register Today
  • Top 5 Things to Consider When Securing AWS Jan 24 2019 7:00 pm UTC 53 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
  • Cloud Security Challenges and Risks Jan 23 2019 7:00 pm UTC 60 mins
    John McNiece,Sr. Product Manager, Symantec and Arnav Ghosh, Product Manager, Symantec
    The Cloud Generation brings a host of new challenges --- vulnerability to increasingly malicious attacks; inability to gain a unified view across multiple cloud and on-premises environments; disparate security policies and tools; and massive traffic to monitor, analyze, and protect.

    Join us for a live webinar where we will take a closer look at some of the greatest security challenges companies are facing as they move to the cloud. We will discuss what companies are experiencing and the solutions they are adopting to bolster their response.

    In this session, you will:

    •. Hear real-world security scenarios as witnessed by a former SOC analyst

    •. Learn why the cloud has been particularly challenging to secure

    •. Find out how Symantec Managed Security Services (MSS) can help to strengthen and improve your cloud strategy through Managed Cloud Defense

    Please Join Us, Register Today
  • 2018 - The year in cyber crime Recorded: Jan 10 2019 49 mins
    Orla Cox, Director of Security Response, Symantec
    Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

    From the explosion of coinmining activity in 2018, to the 600% rise in targeted activity against IoT devices, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

    Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

    • How targeted attacks are evolving to exploit new technologies like IoT.

    • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information

    • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come

    Register Today
  • The IT Security Confidante - Vanishing Perimeter Recorded: Jan 2 2019 2 mins
    Symantec
    (1 min video): Vanishing Perimeters - Now What?
    Complete Cloud Security
  • Symantec's Security Predictions: 2019 and Beyond Recorded: Dec 21 2018 44 mins
    Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec
    The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?

    Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.

    Learn more about:

    - How Artificial Intelligence (AI) will be leveraged in cyber security
    - How growing 5G deployment and adoption will catalyze new attacks
    - Where attacks will be targeted at

    Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.

    Register Now »
  • Security that Scales: Automating Security and Compliance for DevOps Recorded: Dec 18 2018 49 mins
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond Recorded: Dec 11 2018 48 mins
    Kevin Haley, Director Security Response, Symantec
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Recorded: Dec 6 2018 46 mins
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Ghost Solution Suite 3.3 Recorded: Dec 5 2018 60 mins
    David Evans, Principal Product Manager: Deployment Solution, Ghost Solution Suite, Cloud Vulnerability Remediation
    Ghost Solution Suite 3.3 is here!

    Please join us for a special webcast on Wednesday, December 5 to learn more about this exciting release.

    We will discuss and demo some of the cool new features such as the new web console, smart wizards, and much more!

    Don't miss this great opportunity to get the latest information on Ghost Solution Suite 3.3!
  • O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What? Recorded: Nov 30 2018 2 mins
    Symantec
    As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
  • Preventing Ransomware Infections via Office 365 is New Territory. Now What? Recorded: Nov 29 2018 2 mins
    Symantec
    The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
  • From DevOps to DevSecOps: Cloud and Security in 2019 and Beyond Recorded: Nov 28 2018 48 mins
    Tim Sandage (AWS), Reuven Harrison (Tufin) Brian Johnson (DivvyCloud) and Constancio Fernandes (Symantec)
    Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.

    Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:

    - The challenges organizations are facing on how they can culturally come together
    - How security can be an integral part of the DevOps practice to solve these challenges
    - DevOps growth from mid-market to enterprise
    - Challenges with using traditional security tools/processes and collaboration through automation
    - Fostering shared responsibility among Security and DevOps

    This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

    Moderator:
    Tim Sandage, Sr. Security Partner Strategist, AWS
    Panelists:
    Reuven Harrison, CTO & Co-Founder, Tufin
    Brian Johnson, CEO, DivvyCloud
    Constancio Fernandes, Senior Director Development, Symantec
  • A Pragmatic Look at Security Platforms - Immediate Impact and Future Promise Recorded: Nov 14 2018 60 mins
    Ryan Stolte CTO, Bay Dynamics, Jon Oltsik Sr.Principal Analyst, ESG and Patrick Gardner SVP, Email Security & ATP, Symantec
    There has been a lot of industry buzz about cybersecurity platforms over the past year but much of the discussion is long on hyperbole and short on detail.

    What exactly is a cybersecurity platform?
    Are organizations really looking to purchase and deploy these platforms?
    How can they impact the daily lives of security practitioners?

    Join Bay Dynamics, ESG, and Symantec and get educated on:

    - New research about the growing transition to cybersecurity platforms

    - The benefits of cybersecurity platforms

    - How cybersecurity platforms will continue to evolve in the future.

    Register Today
  • You're concerned with Account Takeover on Office 365. Now What? Recorded: Nov 9 2018 2 mins
    Symantec
    You're Concerned with Account Takeover on O365 Now What? (1 min /52 seconds Video)
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Nov 8 2018 59 mins
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • What’s new? The Broadest and Deepest Cloud Security for SaaS, PaaS & IaaS Recorded: Nov 1 2018 61 mins
    Deena Thomchick, Senior Director of Cloud Security, Symantec Linda Park, Senior Manager, IaaS Security & Compliance, Symantec
    Organizations are using more cloud services for more business-critical activities. At the same time organizations face growing privacy regulations, a high rate of data loss (accidental exposures and breaches), and ever-increasing attacks on their cloud assets.

    It is challenging to get the visibility and security you need to protect your Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) clouds as cloud security offerings have been both limited in scope and fragmented across point products.

    Let us show you what’s new and how our solutions will give you the most complete visibility, data security, threat protection and compliance management for your public cloud services with integrated cloud security.

    Learn more about our latest innovations in cloud security for SaaS, PaaS, and IaaS

    •.New Integrated Compliance Management for IaaS – the first Cloud Security Posture Management (CSPM) solution integrated with Cloud Access Security Broker (CASB) and Cloud Workload Protection Platform (CWPP) offering detailed compliance remediation.

    •. Fastest Acting Cloud App Security – the first API-based CASB that can remediate security issues in seconds, with new Fast APIs for Microsoft and Box.

    •. Broadest & Deepest Cloud App Coverage – CASB data security and threat protection for any cloud app, including custom apps.

    •. Best DLP and Threat Protection for IaaS Storage – Gartner Magic Quadrant leading Data Loss Prevention (DLP) and threat protection now integrated with Cloud Workload Protection(CWP) and Gartner Magic Quadrant leading CloudSOC CASB.

    Please Join Us, Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management
  • Live at: Mar 14 2017 5:00 pm
  • Presented by: David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance
  • From:
Your email has been sent.
or close