Hi [[ session.user.profile.firstName ]]

Change Drivers: Impacts to Healthcare Cloud Security and Compliance

Coronavirus is driving major changes in healthcare with the introduction of newly created remote workstations, increased cloud application adoption, the launch new telemedicine services, and more.

This has created a shift in the risk landscape, and healthcare must track this shift and ensure continuous security and compliance to thwart off new exploits from the pandemic.

Learn how leading healthcare organizations are taking this issue head-on by leveraging cloud services, and seamlessly layering security and compliance solutions to ensure uninterrupted patient care, including,

- Coronavirus impacts to the risk landscape, and emerging threats impacting healthcare organizations
- Compliance strategies and to protect patient privacy
- Security best practices to prevent threats
Recorded Jun 2 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Houlding, Director of Healthcare Experiences at Microsoft
Presentation preview: Change Drivers: Impacts to Healthcare Cloud Security and Compliance
  • Channel
  • Channel profile
  • North Korea, Cyber, and the Role of International Law Dec 15 2020 4:00 pm UTC 30 mins
    Professor Sean Watts and Professor Rob Barnsby, United States Military Academy | Eddie Doyle, Check Point Software
    Remember when Sony was hacked by North Korea back in 2014? This event had tremendous implications regarding international law and cyber security.

    Professor Sean Watts & Professor Rob Barnsby, of the United States Military Academy, Judge Advocate General’s (JAG) School at West Point discuss how international law is needed as a foundation before governments can intercede on corporations' behalf. Government is working to protect private enterprise, but corporations must meet them in the middle. It's a trust issue.

    Sign up for the webinar today to get a perspective from two West Point Academy professors on how governments and corporations can best work together in improving cyber security.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Dec 10 2020 5:00 pm UTC 60 mins
    Etyan Segal, Noa Zilberman
    In the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Zero Trust Corporate Access is cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest way to deploy zero trust corporate access, so the right user has least privileged access to the right resource, in the right role, at the right time, from any device to any internal enterprise application.

    Watch this webinar to learn how this technology:
    • Users to easily connect through a unified portal to wide range of applications with no client or software installation.
    • Security administrators to easily deploy secure remote access in less than five minutes from the cloud.
    • Security architects to implement a zero trust architecture with a defined granular access policy to give the right people in the right context, the least privileged access to applications and reduce the attack surface.
    • DevOps and third parties to access sensitive apps, while eliminating network-layer risks
    • Unmatched Security - based on Check Point’s top-rated threat prevention security services.
  • Securely Connect Remote Users with Clientless Zero Trust Corporate Access Dec 10 2020 9:00 am UTC 60 mins
    Etyan Segal, Noa Zilberman
    In the new normal, working environments are no longer defined by fixed network perimeters. As organizations shift employees to work remotely, they may overlook critical security aspects, significantly increasing their exposure to cyberattacks.

    Check Point Corporate Access is a cloud-based, clientless SASE technology, that redefines remote access by delivering the easiest and most secure way to zero trust access so the right user has least privileged access to the right resource, in the right role at the right time from any device, to any internal corporate application—without compromising on security or speed. Watch this webinar to learn how this technology enables:
    • Users to easily connect through a unified portal to a broad range of applications with no client or software installation.
    • Security administrators to easily deploy secure remote access in less than five minutes from the cloud.
    • Security architects to implement a zero trust architecture with a defined granular access policy to give the right people in the right context, the least privileged access to applications and reduce the attack surface.
    • Unmatched Security - based on Check Point’s top-rated threat prevention security services.
  • New Year, New Cloud Dec 7 2020 9:00 pm UTC 45 mins
    Trisha Paine, Head of Cloud Security Marketing and Maya Levine, Cloud Technical Engineer
    To say 2020 was unpredictable is an understatement. The proliferation of remote workers, rapid acceleration of cloud applications and deployments, and the resulting breaches from hackers trying to capitalize on security gaps were unprecedented. What will unfold in 2021 is still unknown, but we are better prepared on how to address and adapt to the changes. Learn how leading organizations are tackling this paradigm shift and developing strategies to improve their visibility, prevent threats, and quickly develop new cloud applications with precision and efficiency.
  • Architecture Best Practices for VMware NSX Security Dec 3 2020 4:00 am UTC 75 mins
    Richard Cove, Cloud Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Outsmarting the Hackers | Cyber Security Best Practices Dec 1 2020 4:00 pm UTC 30 mins
    Vlad Brodsky, CISO, OTC Market Groups | Eddie Doyle, Global Security Strategist, Check Point Software
    In this episode, we'll be joined by Vlad Brodsky, the CISO at at OTC Markets Group. Vlad has over 20 years of experience in Information Technology, Security, Management and Implementation. He also serves as the board member of New York Metro Infragard and faculty member of Global Cyber Institute.

    Vlad will discuss:
    • exciting, new innovations in cyber security
    • best practices to outsmart hackers in 2021 and beyond
    • how to manage risk and navigate complex policies to stay compliant

    Click the "ATTEND" button above to reserve your seat.
  • Best Practices for Securing Your Azure Cloud Nov 26 2020 10:00 am UTC 75 mins
    Matteo Malagnino, Cloud Solution Architect at Microsoft and Arnfinn Strand, Cloud Security Architect at Check Point.
    Security is key to a successful migration to Azure.
    Join this webinar to learn cloud security best practices from Microsoft and Check Point, Microsoft’s #1 Security Partner.
    We will also present exciting offers to perform an instant assessment of your current cloud security.
  • Delivering Service Provider SOAR Services at Scale Recorded: Nov 19 2020 63 mins
    Dean Papa, Siemplify; Bill Diaz, Check Point; Gal Shafir, Siemplify; Marco Garcia, Check Point
    Enterprise Security operations suffer from an overload of alerts, while working with disjointed detection tools and manual and inconsistent processes. By combining Check Point’s Infinity Security Suite with Siemplify’s Security Orchestration, Automation and Response (SOAR) platform, Telcos and Managed Service Providers can deliver high value security operation services at scale to any size enterprise.

    Join this insightful webinar to learn how the Check Point and Siemplify solution enables Managed Service Providers to:
    • Manage investigations across diverse environments from a single multi-tenant platform.
    • Expand portfolio and extend managed Detection and Response capabilities.
    • Accelerate time to market with differentiated services like threat hunting, incident response and Extended Detection and Response (XDR).
    • Demonstrate value, address customer complexity, fix manual limitations and thrive in a hyper-competitive environment.
  • Branching Out: Integrated Security from Branch to Cloud Recorded: Nov 17 2020 63 mins
    Check Point, Aruba, Silver Peak and HPE Pointnext Services teams
    Join Check Point, Aruba, Silver Peak and HPE Pointnext Services to learn how to deploy and secure your SD-WAN environments.

    By 2023, 90% of enterprises will rely on the cloud for branch and remote connections1. While this improves efficiency in many ways, it also increases the security exposure and risk as these connections are no longer protected by centralized data center security.

    To address these challenges, Check Point has partnered with Aruba, and also with Silver Peak to provide integrated and secure SD-WAN solutions for organizations of all sizes. These integrated solutions provide:

    • Continuously updated security
    • Simplified deployment capability
    • Automation that enhances agility
    • Validated interoperability

    Webinar start: 9 am PST, noon EST
  • Top 3 Strategies To Protect Your Data from Ransomware Recorded: Nov 17 2020 40 mins
    Shiraz Saeed, National Practice Leader -- Cyber Risk, Starr Companies | Eddie Doyle, Global Security Strategist, Check Point
    Ransomware attacks are some of the most devastating cyber threats that can ruin your company's finances and reputation. Nothing is more devastating than having your customer data held hostage by ransomware. Additionally, threat actors often demand ransoms that many cannot afford to pay.

    In this episode, Eddie Doyle will interview Shiraz Saeed, National Practice Leader - Cyber Risk at Starr Companies, on the top 3 strategies to protect your data from ransomware.

    Key insights of this episode will include:
    · How employee training can help minimize your organization's risk
    · How back-up segregation can protect your data
    · The use of EDR tools to minimize the threat of ransomware
  • Branching Out: Integrated Security from Branch to Cloud Recorded: Nov 17 2020 62 mins
    Check Point, Aruba, Silver Peak & HPE Pointnext Services teams
    Join Check Point, Aruba, Silver Peak and HPE Pointnext Services to learn how to deploy and secure your SD-WAN environments.

    By 2023, 90% of enterprises will rely on the cloud for branch and remote connections1. While this improves efficiency in many ways, it also increases the security exposure and risk as these connections are no longer protected by centralized data center security.

    To address these challenges, Check Point has partnered with Aruba, and also with Silver Peak to provide integrated and secure SD-WAN solutions for organizations of all sizes. These integrated solutions provide:

    • Continuously updated security
    • Simplified deployment capability
    • Automation that enhances agility
    • Validated interoperability

    Webinar start: 8 am GMT
  • Architecture Best Practices for VMware NSX Security Recorded: Nov 12 2020 76 mins
    John-Patrick Edwards, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Preventing cyber attacks; lost cause or is it possible? Recorded: Nov 10 2020 43 mins
    Kierk Sanderlin, Head of Engineering & Check Point Security Evangelist
    Breaches are on the rise and some leading cyber security voices are saying the best course of action is to focus on detection and response. The argument is attackers only need to be successful once with their attacks to gain a foothold and compromise the network or endpoint. Other cyber security voices are saying we need a prevention-first mindset that focuses on blocking threats before they can infect a network or host. Join us as we discuss the practice of actually preventing cyber attacks vs. just detecting them.

    In this session you will:
    • Understand why prevention-first is a solid security strategy
    • Hear about why there is a need to balance detection with prevention when it comes to budget
    • Find out how to reduce the noise and distractions that many cyber security incidents cause
    • Learn practical steps you can take to focus on prevention-first
  • [Panel] Cyber Attack Prevention Recorded: Nov 10 2020 63 mins
    Eric Adams, Kyriba; Jeffrey Gardner, Rapid7; Dan Sarel, Palo Alto; & Kierk Sanderlin, Check Point Software Technologies, Ltd.
    As organizations face several different challenges in 2020 and beyond, preparing for a cyber attack is as important as ever. Businesses face a myriad of cyber threats; from phishing to ransomware, it's imperative that your organization puts in place measures to protect your most important assets.

    Join top security leaders for an interactive discussion on how to better secure the enterprise in 2021 and learn more about:

    - Trends in cyber attacks and what's at risk
    - Prevention best practices
    - Solution recommendations for attack detection and response
    - Top threats on the horizon and what's at risk
    - How organisations can take the necessary steps to prepare for the unexpected and build business resilience
  • How to Discover Your Biggest Cyber Security Blind Spots Recorded: Nov 4 2020 45 mins
    Bryson Bort, CEO and Founder at SCYTHE | Eddie Doyle, Global Security Strategist at Check Point
    Are you confident your cyber defenses can withstand next-generation cyber threats? Have you checked to make sure you don't have any critical blind spots? Discovering and patching these blind spots is absolutely vital to the success of your cyber security.

    Eddie Doyle will interview Bryson Bort, CEO and Founder at SCYTHE, a cyber security platform which enables you to validate your organization's defenses without the need for costly training or technical expertise.

    It's not enough to just assume your security solution is working. You must proactively test your security solution. In this talk, Bryson will discuss how you can perform adversary emulations to test your defenses against the most advanced threat actor emulations.
  • Architecture Best Practices for VMware NSX Security Recorded: Oct 29 2020 65 mins
    Elier Cruz, Global Security Architect at Check Point
    CloudGuard Network Security for VMware NSX-T delivers industry-leading multi-layered defenses for multi-cloud architectures, allowing to protect North-South and East-West traffic with different use cases with their reference architectures.

    Learn about:
    • How the integration of CloudGuard with VMware NSX-T 2.5 and 3.0 provides advanced threat prevention and automated cloud network security.
    • Use cases, architecture diagrams, and best practices for securing SDDCs, with real customer examples.
    • Zero-Trust driven approach to build a comprehensive VMware NSX security strategy
  • Choosing Optimal Endpoint Security in the New Normal Recorded: Oct 29 2020 39 mins
    Dana Katz, Head of Product Marketing, Threat Prevention at Check Point; David Ulloa, CISO at IMC Companies
    With the immediate transition to a fully remote workforce organizations are vulnerable to endpoint attacks more than ever. As evidence, cybercriminals are scaling up their operations - ransomware attacks in the US doubled in Q3 of 2020.

    What can be done to protect employees’ workstations in the new normal?

    This session with the CISO of IMC Companies David Ulloa covers the following topics:
    •Top 5 must-have endpoint protections
    •How to secure remote workforce without no impact on business productivity
    •Ways to achieve lower TCO
  • Preventing Attacks on IoT Networks and Devices Recorded: Oct 27 2020 40 mins
    Itzik Feiglevitch, Senior Product Manager – Cyber Security, Cloud, IoT and Networking
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations use IoT, almost every company is exposed. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers.

    Join the webinar to learn how to prevent IoT cyber attacks by:
    • Exposing all IoT security risks across IT and OT networks
    • Easily creating policies to secure thousands of IoT devices
    • Preventing both network-based and device-level attacks
  • C-level Talk: Defining the Modern Cyber-Security Architecture Recorded: Oct 27 2020 38 mins
    Grant Asplund, Chief Cyber Security Evangelist at Check Point Software Technologies
    The stakes have never been higher for organisations to get cybersecurity right. There are many forces driving this sense of urgency: companies adding new private and public cloud platforms, new products, apps, and web capabilities, not to mention securing the increasing number of remote workers because of the Covid-19 pandemic. With the increase in sophisticated cyber-attacks, security teams are under pressure to protect organizations while under-staffed, under-equipped, and under budget. What would be the right modern approach?

    Join Grant Asplund while he explores the conclusions of a recent survey of more than 400 global security professionals, CISOs and CIOs about security consolidation. You will learn what your peers think about managing dozens of security solutions and its impact on overall security.
  • Smart Event Full Threat Visibility Recorded: Oct 26 2020 31 mins
    Roberto Quinones, Technical Territory Manager LAT GRC Sales, Check Point
    This webinar is dedicated to Smart Events, and Smart Event Products.

    You'll receive an introduction to Smart Event, real time threat detection with Smart Event, customizable views and reports, and a demo in which we investigate a security event.
Secure Your Everything
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with our new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Change Drivers: Impacts to Healthcare Cloud Security and Compliance
  • Live at: Jun 2 2020 7:00 pm
  • Presented by: David Houlding, Director of Healthcare Experiences at Microsoft
  • From:
Your email has been sent.
or close