Hi [[ session.user.profile.firstName ]]

Ransomware Survival Guide: Healthcare

"All systems were quickly disconnected, and the network was shut down in order to prevent further propagation," Is this your response to a ransomware attack? If the answer is Yes or Maybe, this BrightTalk session can help you improve your ransomware response. In Oct 2020, Ransomware hit the Universal Health Services (UHS), one of the largest US health systems, and consequently, malicious actor affected all of its US care sites and hospitals, spurring clinicians into EHR downtime procedures. Healthcare facilities use common EMR and EHR solutions. When one is hit, it's inevitable for others to avoid it.

In this BrightTalk session, Healthcare tech and IT will learn:
How ransomware is surging in Healthcare facilities?
Why agent-based endpoint security may not be your answer to ransomware defense
What is the fundamental mind shift in network design required?
What to do before, during, and after a ransomware attack with Zero Trust solution?
Why you shouldn’t and cannot pay ransoms? What is Ransomware Kill Switch and how it can protect you?
How to stop ransomware propagation in seconds?
Recorded Jan 22 2021 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mitch Parker, Kris Kistler and Alissa Knight
Presentation preview: Ransomware Survival Guide: Healthcare

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware in Education: The Changing Landscape in Cybersecurity and Privacy Mar 19 2021 4:00 pm UTC 45 mins
    Leah McLean and Education CISO
    Spiking ransomware attacks against schools make pandemic education even harder. Such attacks have prominently hit schools in Baltimore, Miami, and Toledo. Those attacks lock up school computer systems and student identity data until the district pays a ransom, which affects in-person schooling and can make distance learning impossible for days on end. What’s in your Ransomware defense strategy and cybersecurity budget planning?

    - COVID-19-related business changes & what forward-thinking Edu IT/IS leaders are doing differently in response to emerging security and privacy challenges.
    - Why IT/IS Security leaders get fired - lessons learned from mistakes CISOs make post-breach
    - Where US federal & state privacy legislation is headed and what Edu IT/IS leaders need to do to prepare now
  • CrowdStrike + Airgap: Applying the Zero Trust Model to Endpoint Security Mar 10 2021 5:00 pm UTC 45 mins
    Shad Gunderson
    Malware and ransomware are designed to move laterally after dormant phase to target entire organizations, locking up entire networks in seconds. Stop malware propagation and attacker lateral movement in its tracks with the Airgap Zero Trust Isolation that makes every endpoint a Zero Trust endpoint in the network of its own. This webcast will explain how Airgap complements Crowdstrike's malware prevention and applies Zero Trust policy on the lateral communications between endpoint devices and mission-critical applications with agentless Zero Trust Isolation architecture. Additionally, we will go over the Ransomware Kill Switch use cases for proactive incident responses.
  • Tactics & Measures for Ransomware in Enterprise Workplace 2021 Mar 5 2021 6:00 pm UTC 47 mins
    Jeff Man, Poul Frederiksen, Syya Yasotornrat
    On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.

    What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is our honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.

    - From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?
    - State of Zero Trust practices in the real world, particularly in the public sector?
    - How do you detect and stop the propagation with Zero Trust Isolation? Can Airgap Ransomware Kill Switch help?
  • Ransomware Stops Here: Ransomware Kill Switch Use Cases Mar 3 2021 9:00 pm UTC 41 mins
    Shad Gunderson
    In the ransomware battleground, time is of the essence. Gaining full understanding of the threat and malware behavior is becoming increasingly challenging with cyber adversaries blurring the lines between the types of attacks used to target organizations. In this webcast, the security operation experts will share how they use Ransomware Kill Switch to stop the propagation against the myriad of threats to your data and operations instantly. Join us to know what Ransomware Kill Switch is and understand how to set policies for defend against what your adversaries are after? And How do you use Airgap's Ransomware Kill Switch to defend your enterprise?
  • Ransomware Stops Here: Ransomware Kill Switch Use Cases Recorded: Feb 24 2021 42 mins
    Shad Gunderson
    In the ransomware battleground, time is of the essence. Gaining full understanding of the threat and malware behavior is becoming increasingly challenging with cyber adversaries blurring the lines between the types of attacks used to target organizations. In this webcast, the security operation experts will share how they use Ransomware Kill Switch to stop the propagation against the myriad of threats to your data and operations instantly. Join us to know what Ransomware Kill Switch is and understand how to set policies for defend against what your adversaries are after? And How do you use Airgap's Ransomware Kill Switch to defend your enterprise?
  • Ransomware Response Plan in 2021 Recorded: Feb 20 2021 7 mins
    Chase Cunningham and Chuck Harold
    In 2021, organizations can no longer afford to be unprepared. Company-wide ransomware playbooks and response plans will be created to dictate exactly what to do and how to mitigate any damage to the brand’s reputation.

    In this session, Dr. Chase Cunningham aka Dr. Zero Trust and Bill Thrash will share our view on
    What you should include in your Ransomware Response Plan?
    How do you define zero trust access policies?
    Is Airgap’s Ransomware Kill Switch right for my organization?
    What do I need to know about cybersecurity mesh and security intelligence aggregation?
  • Ransomware Trend: Double-Extortion Attacks Recorded: Feb 19 2021 26 mins
    Poul Frederiksen, Syya Yasotornrat
    In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up. With these bigger attacks coming in 2021, the adversary has targeted the organization or the government department. How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.
  • Ransomware Response Plan in 2021 Recorded: Feb 19 2021 8 mins
    Chase Cunningham and Chuck Harold
    In 2021, organizations can no longer afford to be unprepared. Company-wide ransomware playbooks and response plans will be created to dictate exactly what to do and how to mitigate any damage to the brand’s reputation.

    In this session, Dr. Chase Cunningham aka Dr. Zero Trust and Bill Thrash will share our view on
    What you should include in your Ransomware Response Plan?
    How do you define zero trust access policies?
    Is Airgap’s Ransomware Kill Switch right for my organization?
    What do I need to know about cybersecurity mesh and security intelligence aggregation?
  • Ransomware Legislation and Public Policy Impact in 2021: What should you expect? Recorded: Feb 18 2021 38 mins
    Simon Mijolovic and Chuck Harold
    The SolarWinds hack wasn’t ransomware, but it did shine a spotlight on the important role that cybersecurity plays in national security. President Joe Biden has already said that his administration will make cybersecurity a top priority at every level of government and this undoubtedly will include ransomware.

    In 2020, the US Treasury Department threatened financial penalties against companies paying ransoms to hackers. While it was intended to thwart future ransomware attacks, it put victims and incident responders in a tough spot.

    How do you stay proactive with your endpoint defense strategy and fight every second when your organization is under ransomware attack? We will be going through the Zero Trust concept of cybersecurity mesh and the internet of behaviors to keep you stay ahead of adversaries in the connected digital transformation.
  • Okta + Airgap – Securing Zero-Trust Isolation Everywhere Recorded: Feb 18 2021 19 mins
    Ritesh Agrawal
    You might have learned in our channel that Airgap's Zero Trust Isolation can provide extensive device visibility, network isolation, and adaptive security enforcement within your corporate network.

    Popular castle and moat security approach lends organization vulnerable once the perimeter is breached. Additionally, legacy enterprise blueprints provide excessive access to business assets everywhere. Therefore, once the perimeter is breached, the bad actors are free to roam inside your network without being detected for months.

    To secure access into your enterprise "crown jewels", zero-trust identity access management has become the must-have to protect against data breaches. Unified authentication and automated authorization for all enterprise access controls helps protect your infrastructure even if your perimeter is breached. That's Airgap's promise.

    Airgap's Zero Trust Isolation platform integrates with Okta and other leading federated IDM/IAM solutions to not only authenticate but also validate the user intent before granting access to your crown jewels.

    In this session, we will review best practices for securing access with Airgap to prevent threat propagation in real-time.

    You will learn about
    - Agentless Zero Trust security practices overcome visibility gaps anywhere
    - Instant MFA SSO to virtually any network assets and applications
    - Reduce attack surface and dynamic automated policy creation
  • Tactics & Measures for Ransomware in Enterprise Workplace 2021 Recorded: Feb 17 2021
    Jeff Man, Poul Frederiksen, Syya Yasotornrat
    On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.

    What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is our honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.

    - From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?
    - State of Zero Trust practices in the real world, particularly in the public sector?
    - How do you detect and stop the propagation with Zero Trust Isolation? Can Airgap Ransomware Kill Switch help?
  • Tactics & Measures for Ransomware in Enterprise Workplace 2021 Recorded: Feb 17 2021 48 mins
    Jeff Man, Poul Frederiksen, Syya Yasotornrat
    On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.

    What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is our honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.

    - From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?
    - State of Zero Trust practices in the real world, particularly in the public sector?
    - How do you detect and stop the propagation with Zero Trust Isolation? Can Airgap Ransomware Kill Switch help?
  • Ransomware Trend: Double-Extortion Attacks Recorded: Feb 12 2021 27 mins
    Poul Frederiksen, Syya Yasotornrat
    In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up. With these bigger attacks coming in 2021, the adversary has targeted the organization or the government department. How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.
  • Responding to Ransomware for Midsize Enterprises with NIST Recorded: Feb 11 2021 48 mins
    Robert Hodges and Alissa Valentina Knight
    The National Cybersecurity Center of Excellence (NCCoE) recently released the draft NIST Cybersecurity Practice Guide SP 1800-26, Detecting and Responding to Ransomware and Other Destructive Events. How do you in mid-enterprise prepare, react, or recover from ransomware attacks? Understand your state of compromise with NIST guidelines. Check your exposure to ransomware attacks & get intel to prioritize and contain the propagation fast. Join this talk with NIST Cybersecurity Expert on how Zero Trust Security matters for Mid-Enterprises.
  • Ransomware Legislation and Public Policy Impact in 2021: What should you expect? Recorded: Feb 11 2021 39 mins
    Simon Mijolovic and Chuck Harold
    The SolarWinds hack wasn’t ransomware, but it did shine a spotlight on the important role that cybersecurity plays in national security. President Joe Biden has already said that his administration will make cybersecurity a top priority at every level of government and this undoubtedly will include ransomware.

    In 2020, the US Treasury Department threatened financial penalties against companies paying ransoms to hackers. While it was intended to thwart future ransomware attacks, it put victims and incident responders in a tough spot.

    How do you stay proactive with your endpoint defense strategy and fight every second when your organization is under ransomware attack? We will be going through the Zero Trust concept of cybersecurity mesh and the internet of behaviors to keep you stay ahead of adversaries in the connected digital transformation.
  • Ransomware Survival Guide: Healthcare Recorded: Feb 10 2021 57 mins
    Mitch Parker, Kris Kistler and Alissa Knight
    "All systems were quickly disconnected, and the network was shut down in order to prevent further propagation," Is this your response to a ransomware attack? If the answer is Yes or Maybe, this BrightTalk session can help you improve your ransomware response. In Oct 2020, Ransomware hit the Universal Health Services (UHS), one of the largest US health systems, and consequently, malicious actor affected all of its US care sites and hospitals, spurring clinicians into EHR downtime procedures. Healthcare facilities use common EMR and EHR solutions. When one is hit, it's inevitable for others to avoid it.

    In this BrightTalk session, Healthcare CISO, CIO , tech and IT will learn:
    How ransomware is surging in Healthcare facilities?
    Why agent-based endpoint security may not be your answer to ransomware defense
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms? What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Ransomware Trend: Ransomware As A Service (RaaS) Economy Recorded: Feb 5 2021 34 mins
    Ted Harrington, Poul Frederiksen, and Syya Yasotornrat
    Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model.

    These new strains of ransomware make prevention and planning more important than ever to prevent ransomware attacks. Concurrently, ransomware authors are increasingly selling access to ransomware as service offerings that increase the number of attackers and the variants of malware.

    In this session, we will:
    - Review examples and common denominators of known RaaS attack variants: Ryuk, Lockbit, REvil, Egregor...
    - Go over how fast you can detect and neutralize the RaaS propagation
    - Understand security data intelligence to configure adaptively for Zero Trust access
    - Learn how Zero Trust Isolation to protect your organization against RaaS attacks
  • Okta + Airgap – Securing Zero-Trust Isolation Everywhere Recorded: Feb 3 2021 20 mins
    Ritesh Agrawal
    You might have learned in our channel that Airgap's Zero Trust Isolation can provide extensive device visibility, network isolation, and adaptive security enforcement within your corporate network.

    Popular castle and moat security approach lends organization vulnerable once the perimeter is breached. Additionally, legacy enterprise blueprints provide excessive access to business assets everywhere. Therefore, once the perimeter is breached, the bad actors are free to roam inside your network without being detected for months.

    To secure access into your enterprise "crown jewels", zero-trust identity access management has become the must-have to protect against data breaches. Unified authentication and automated authorization for all enterprise access controls helps protect your infrastructure even if your perimeter is breached. That's Airgap's promise.

    Airgap's Zero Trust Isolation platform integrates with Okta and other leading federated IDM/IAM solutions to not only authenticate but also validate the user intent before granting access to your crown jewels.

    In this session, we will review best practices for securing access with Airgap to prevent threat propagation in real-time.

    You will learn about
    - Agentless Zero Trust security practices overcome visibility gaps anywhere
    - Instant MFA SSO to virtually any network assets and applications
    - Reduce attack surface and dynamic automated policy creation
  • Top 5 Ransomware Observations and Behavior Trends for 2021 Recorded: Feb 3 2021 29 mins
    Dr. Chase Cunningham, MIke Davis
    Ransomware Intelligence Observations and Behavior Prediction for 2021

    The exponential growth of ransomware creates a constant threat to end-users and corporate ITs. Regardless of your business size, industry, or location, preventing ransomware is a critical task to your organization, both from a financial perspective and for your brand reputation.

    In this webcast, you’ll learn recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    - Top 5 ransomware cyber threat patterns and trends
    - Adapting to new security mindset and network designs
    - Using zero trust with auto-discovery, security operational visibility, and instant countermeasures to stop ransomware propagation on points of exposure
  • How has Ransomware Impacted the US Government? Recorded: Feb 2 2021 39 mins
    Ritesh Agrawal and Simon Mijolovic
    How has Ransomware Impacted the US Government? Ransomware Kill Switch Comes to the Rescue.
    Ransomware crimes have been soaring. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state, and local governments, law enforcement agencies, and even schools.

    The common denominator for ransomware attacks that drive headlines in 2020 is lateral movement and propagation. This is when ransomware or attackers, after gaining initial access, spread throughout corporate vLANs to enterprise crown jewels or ransom endpoints.

    Airgap Networks delivers the Agentless Zero-Trust Isolation platform (SaaS) and Ransomware Kill Switch to neutralize the spread of threats in seconds and to stop the unauthorized lateral movement by containing malware at the device.

    In this invitation-only public sector-focused BrightTALK, you will learn:
    - How the lateral movement exhibited by ransomware drives high-profile breaches
    - How the Airgap'st Zero Trust Isolation can achieve instant threat containment? -- The Secret Sauce
    - Why Agentless Zero Trust Solutions solution matter?
    - Unlearn your complex network design and security mindset
The Best Defense Against Ransomware Propagation
Ransomware attacks and threats are growing exponentially. While many security companies are trying to prevent ransomware from breaching the perimeter of your network, Airgap's Zero Trust Isolation Platform protects your organization from the inside out. Additionally, Airgap’s Ransomware Kill Switch is the most potent ransomware response for an IT organization. The solution can be deployed in minutes without any endpoint agents, forklift upgrades, or design changes. Airgap was founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io or email media@airgap.io

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ransomware Survival Guide: Healthcare
  • Live at: Jan 22 2021 9:00 pm
  • Presented by: Mitch Parker, Kris Kistler and Alissa Knight
  • From:
Your email has been sent.
or close