2018 Guide to Building Your Security Strategy
Presentation recording and slides from 1/23/18 webinar.
Ransomware continues to plague healthcare and the situation is becoming more dangerous as cybercriminals move towards increasingly sophisticated forms of cryptographic malware to carry out targeted attacks. The 2016 HIMSS Cybersecurity Survey showed healthcare still lags behind other industries in deploying commonly accepted security technology. Join us to hear a CISO’s practical guide to prioritizing security investments and building a proven cyber awareness training plan and learn how to work with governing committees and boards to implement a holistic security architecture.
Speakers:
- Ryan Witt, Healthcare Industry Practice Leader, Proofpoint
- Martin Littmann, Chief Technology Officer & CISO, Kelsey-Seybold Clinic
Disaster & Disruption - Data Protection & Recovery Planning
Presentation slides and recording from 1/10/18 webinar.
Taking the Physician's Pulse: Tackling Cyber Threats in Healthcare
Accenture and the American Medical Association (AMA) surveyed physicians across the United States regarding their experiences and attitudes toward cybersecurity. The findings suggest a strong need for improved cybersecurity education for physicians.
Webinar: 2018 Guide to Building Your Security Strategy
Visit our resource center for downloadable slides and a recording of the presentation.
Webinar: Disaster & Disruption: Data Protection & Recovery Planning
Visit our resource center for slides and recording and a recording of the webinar.
China Doubles Down on the Double helix
November 2, 2017 article from Neo.Life examining the boom of genomics in China and whether other countries will be left behind.
Safeguarding the Bioeconomy III: Securing Life Sciences Data Meeting Recap October 20-21, 2016
The National Academies of Sciences, Engineering, and Medicine convened a workshop to assist the Federal Bureau of Investigation Weapons of Mass Destruction Directorate in understanding the applications and potential security implications of emerging technologies at the interface of the life sciences and information sciences. At the workshop, participants from wide ranging backgrounds discussed the rapid pace of growth in the bioeconomy, with a particular focus on the bioinformatics economy, and the imperative to safeguard it in the interest of national security.
Safeguarding the Bioeconomy: Applications and Implications of Emerging Science Meeting Recap July 27-28, 2015
The National Academies of Sciences, Engineering, and Medicine conducted a workshop to assist the Federal Bureau of Investigation Weapons of Mass Destruction Directorate in understanding the applications and implications of emerging technologies at the interface of the life sciences, chemical sciences, and other areas of science and engineering. Workshop participants identified and discussed areas of convergence in the life sciences research enterprise, how these emerging areas may be incorporated into the global bioeconomy, and the security implications of their development.
Safeguarding the Bioeconomy: U.S. Opportunities and Challenges
Prepared statement of Edward H. You Supervisory Special Agent, Biological Countermeasures Unit, Countermeasures and Operations Section, Weapons of Mass Destruction Directorate, FBI.
Testimony for the U.S.-China Economic and Security Review Commission1
March 16, 2017
This statement describes the development of the bioeconomy within the United States and China, identifies the opportunities and security challenges facing the United States, and how the United States might better expand the scope of what is determined to be a biological threat and support biotechnology research and industry development for national security.
HITRUST Cyber Threat XChange
The HITRUST Cyber Threat XChange (CTX) is the most active cyber threat sharing platform that automates the process of collecting and analyzing cyber threats and distributing actionable indicators (IOCs) that organizations of varying sizes and cyber security maturity can utilize to improve their cyber defenses.