- 72
- 7 313
Sensato Cybersecurity Solutions
เข้าร่วมเมื่อ 20 ก.พ. 2014
Sensato Cybersecurity is now part of CloudWave, the expert in healthcare data security and the largest, most experienced, and trusted independent software hosting provider in healthcare. CloudWave provides cloud, cybersecurity, and managed services that deliver a multi-cloud approach to enable healthcare organizations with any electronic health record (EHR) service architect, integrate, manage, and protect a personalized solution using private cloud, public cloud, and cloud edge resources. The company is 100% focused on healthcare and delivers enterprise cloud services to more than 250 hospitals and healthcare organizations, supporting 125+ EHR, clinical, and enterprise applications.
Visit our website: www.gocloudwave.com
Visit our website: www.gocloudwave.com
Business Continuity in Healthcare: Why we get it wrong?
Business Continuity in Healthcare: Why we get it wrong?
Often organizations, despite appropriate business continuity planning, find themselves struggling to recover from a cybersecurity incident. The average downtime related to a cybersecurity incident is measured in weeks and at times months.
During this webinar we put the spotlight on the fallacy of business continuity in healthcare. Learn why we get this critical topic wrong, how attackers destroy backups and most importantly how do get business continuity and incident response planning right.
Often organizations, despite appropriate business continuity planning, find themselves struggling to recover from a cybersecurity incident. The average downtime related to a cybersecurity incident is measured in weeks and at times months.
During this webinar we put the spotlight on the fallacy of business continuity in healthcare. Learn why we get this critical topic wrong, how attackers destroy backups and most importantly how do get business continuity and incident response planning right.
มุมมอง: 54
วีดีโอ
Integrating Clinical Rapid Response for Medical Device Cybersecurity
มุมมอง 502 ชั่วโมงที่ผ่านมา
This chalk talk will cover why it’s important to include your Clinical Rapid Response Team in your incident response planning. This session walks you through a rapid response methodology that integrates clinical rapid response teams with IT and security teams for advanced medical device incident response. The goal of this chalk talk is to get you thinking and help get you to a new level of prep...
Cloud vs On-Premises: Lessons from the Trenches - Cybersecurity Insider Program Webinar
มุมมอง 282 ชั่วโมงที่ผ่านมา
There are lots of misconceptions and confusion about the decision to move all or part of your infrastructure to the cloud. Some conversations like, we are moving to the cloud, we are not moving to the cloud, we are doing both. The cloud is safer than on-premises, no it is not safer. It is cheaper, it is more expensive. The debate and opinions seem to never end. This webinar separates fact from ...
Securing AI Systems in Healthcare Best Practices and Policy Guidelines
มุมมอง 1072 ชั่วโมงที่ผ่านมา
This session provides valuable insights into the unique challenges and best practices associated with securing healthcare systems against cyber-attacks using Artificial Intelligence (AI). During the webinar, we discuss the following topics: - AI Baseline - Understanding the AI baseline and different types of AI - AI Defense - How to effectively deal with AI threats and challenges - AI Policies ...
Medical Device Security FDA Myths vs Realities
มุมมอง 552 ชั่วโมงที่ผ่านมา
The myths and realities of what the FDA Cybersecurity program entails and, more importantly, what it does not entail are misunderstood in healthcare IT and Clinical Engineering. This webinar breaks down the common myths and tells you the real story about what you can and cannot do regarding medical device security. Some myths that will be discussed: - You can't patch medical devices, or you voi...
Cybersecurity Lessons from the Energy Sector Webinar
มุมมอง 582 ชั่วโมงที่ผ่านมา
When looking across the sixteen critical infrastructure sectors, as defined by the Department of Homeland Security, the Energy Sector appears to be at the forefront of cybersecurity. This webinar shares the techniques, tactics, and practices being employed in the energy sector to help safeguard the nation's power grid and we discuss how these learnings can be applied to healthcare. Our early re...
Cybersecurity Awareness Month Recap and Four Key Cybersecurity Strategies for Healthcare
มุมมอง 642 ชั่วโมงที่ผ่านมา
To wrap up Cybersecurity Awareness Month, we will recap the four key CISA messages and share additional resources specific to healthcare. We share: - CISA’s cybersecurity awareness month messages for your end users - CISA and HHS resources specific to healthcare - Overview of online training available - Four top cybersecurity areas your organization can focus on for 2024. - Sneak peek at the In...
Ask the Expert - Cybersecurity Insider Program Webinar
มุมมอง 582 ชั่วโมงที่ผ่านมา
A panel of cybersecurity experts answers questions about cybersecurity and artificial intelligence in healthcare, medical device security, and how to get your entire staff, including senior leadership, engaged in cybersecurity planning.
Healthcare Cybersecurity State of the Union: 2023 Lessons Learned and 2024 Strategies
มุมมอง 1062 ชั่วโมงที่ผ่านมา
This webinar shares Healthcare Cybersecurity lessons from 2023 and how to apply them to advance your cybersecurity strategies for 2024. You'll learn some easy ways to improve your cybersecurity stance, including simplifying your approach.
A New Approach to Cybersecurity Incident Response for Healthcare
มุมมอง 1182 ชั่วโมงที่ผ่านมา
A good and robust incident response program is the last defense against cyber attackers. If you don't continually evolve your incident response processes, you don't stand a good chance of stopping a cyberattack. This webinar will reveal a new approach to cybersecurity incident response that considers the patient first and shares why current processes are set up to protect data, not patients.
A Conversation with the FDA about Medical Device Cybersecurity
มุมมอง 802 ชั่วโมงที่ผ่านมา
The FDA provides an overview of its cybersecurity authorities and recently updated medical device cybersecurity guidance to help you understand how they fit into your cybersecurity risk management strategy. Jessica Wilkerson, Senior Cyber Policy Advisor and Medical Device Cybersecurity Team Lead shares real examples of cyber incidents that have impacted medical devices. She will share the FDA r...
Cybersecurity as a Service Overview for WSHA Members
มุมมอง 92 ชั่วโมงที่ผ่านมา
Learn about a solution that will allow a dedicated team to monitor your organization to detect threats, help you comply with regulations, and allow you to respond quickly to a threat, all while increasing your defensibility and decreasing your liability.
Anatomy of a Healthcare Breach and Lessons Learned
มุมมอง 802 ชั่วโมงที่ผ่านมา
Evaluate the impact of a breach on hospital staff and identify what you can learn from recent breaches to put processes in place to improve breach impacts on your organization and front-line staff. We will use the Ascension, Change Healthcare, and other recent breaches as examples.
In Depth Look at Cyber Exploits from Attackers Perspective
มุมมอง 1122 ชั่วโมงที่ผ่านมา
This webinar dissects some of the most recent and impactful cyberattacks, including those targeting SSH, BIOS, and critical infrastructure within the healthcare sector. You will gain insights into: - SSH Compromise (CVE-2024-3094): Understand how a critical backdoor in the XZ Utils library is exploited to gain unauthorized access via SSH. - BIOS Attacks: Learn about advanced persistent threats ...
The Changing Landscape of Cybersecurity Accountability in Healthcare
มุมมอง 512 ชั่วโมงที่ผ่านมา
There is a new trend in healthcare cybersecurity that may concern some members of the C-Suite. As lawsuits are increasing, more CISOs and other C-Suite (CIO, CEO, CFO) members are starting to be held legally accountable for not deploying appropriate security measures. This session will discuss what CISOs and the C-Suite could focus on to reduce liability while increasing defensibility in the ev...
Healthcare Cybersecurity Attack Dissection - A Mini Tabletop Simulation
มุมมอง 572 ชั่วโมงที่ผ่านมา
Healthcare Cybersecurity Attack Dissection - A Mini Tabletop Simulation
Candid Conversation with Hacking Experts and Pen Testing Lessons Learned
มุมมอง 392 ชั่วโมงที่ผ่านมา
Candid Conversation with Hacking Experts and Pen Testing Lessons Learned
Panel Discussion 2025 Cybersecurity Healthcare Trends
มุมมอง 322 ชั่วโมงที่ผ่านมา
Panel Discussion 2025 Cybersecurity Healthcare Trends
The Hacker's Perspective - Cybersecurity Insider Monthly Webinar
มุมมอง 1082 หลายเดือนก่อน
The Hacker's Perspective - Cybersecurity Insider Monthly Webinar
Review of HHS' Healthcare and Public Health (HPH) Cybersecurity Performance Goals
มุมมอง 1042 หลายเดือนก่อน
Review of HHS' Healthcare and Public Health (HPH) Cybersecurity Performance Goals
Cybersecurity Trends for 2024 - Part II
มุมมอง 528 หลายเดือนก่อน
Cybersecurity Trends for 2024 - Part II
2024 Cybersecurity Trends for Rural Hospitals
มุมมอง 589 หลายเดือนก่อน
2024 Cybersecurity Trends for Rural Hospitals
Insure and Ensure Cyber Liability Insurance Best Practices and Advanced Cybersecurity Strategies
มุมมอง 409 หลายเดือนก่อน
Insure and Ensure Cyber Liability Insurance Best Practices and Advanced Cybersecurity Strategies
A Review of the Proposed NY State Cybersecurity Regulations
มุมมอง 5810 หลายเดือนก่อน
A Review of the Proposed NY State Cybersecurity Regulations
What Rural Healthcare Leaders Need to Know to Advance Cybersecurity Readiness
มุมมอง 68ปีที่แล้ว
What Rural Healthcare Leaders Need to Know to Advance Cybersecurity Readiness
CloudWave Cybersecurity-as-a-Service - Protect Your Healthcare Organization
มุมมอง 154ปีที่แล้ว
CloudWave Cybersecurity-as-a-Service - Protect Your Healthcare Organization
10 Things Rural Hospitals Can do to Reduce Cyber Liability Insurance Premiums
มุมมอง 272 ปีที่แล้ว
10 Things Rural Hospitals Can do to Reduce Cyber Liability Insurance Premiums
How to Respond to and Contain a Ransomware Attack in 14-Minutes or Less
มุมมอง 1362 ปีที่แล้ว
How to Respond to and Contain a Ransomware Attack in 14-Minutes or Less
Cybersecurity Training Series - Session VI - Tactical Strategies to Thwart Today's Modern Attacks
มุมมอง 452 ปีที่แล้ว
Cybersecurity Training Series - Session VI - Tactical Strategies to Thwart Today's Modern Attacks
Cybersecurity Investments for Rural Hospitals that Provide a Positive ROI
มุมมอง 302 ปีที่แล้ว
Cybersecurity Investments for Rural Hospitals that Provide a Positive ROI
Question: Anydesk has been used, does this happen in the free or paid version? Shouldn't we use it in corporate environments?
Thank you for this very valuable information.
Fantastic series thank you
U r most welcome- thank you for watching.
So your saying. Without detail. That just like nukes would have 10 stops to prevent the 1 launch (hopefully) that u need to place a stop (physical) procedure in all aspects of the A.I. software, hardware, communication, authority, override, impact, strategy(s), resilience In other words all aspects have to function with no hiccups to implement A.I. command/action so no wayward occurs Whereas on the other side a negligent person/group would only have one stop path amongst all components & possibilities within A.I.
Ultimately, yes...as with most things - the civilized follow rules, the criminal and nefarious are free to act without regard for honor. The larger challenge here is that, as we know, access to cybermunitions is much easier than to a nuke. This does take the concept of asymmetric warfare to a new level, because unlike physical weapons which are typically only employable one time - cyberweapons can be used over and over once they are launched by anyone who finds one in the wild. Thank you for you comment.
Sensational thoughts. I can see you're nearly at the solution to many / nearly all cyber problems but can it work Eg. The heart of every block/section of code has a countdown. So many uses (1-100) before it is rebooted/upgraded/checked. The hardware will just sit motionless until new/checked software or disable if clock not in upgrade/use synchronisity. Problem = what if hacker pays software designer to catch a clock so to speak and place their A.I. controlling software in. Bypasses wifi/lifi checks etc and goes on rogue mission based on maps Eg 2 The software has way points/markers under the code to say yes, working exactly how written. You can guess the rest. The hacker/designer pays $ or threatens check modules/arenas (if not 5 centralised fortified units in world checking all code (military has own)) to make an understanding that that hardware needs to go awall for their molevelent ways. Might be more complicated than this but the arena centralised station could have ability to use stops in code (underneath - impenetrable) to prevent code being read and hardware going, well, crazy/nuts Ie. Eyes everywhere see hardware, code stops can prevent awall instantly A.I. luckily is new to world so can be roped in before it ropes us
A.I. has advantages over stops though. If it's going to be simulated on natural brains then A.I. will ultimately have 10s of thousands of alternative doors to use if one is stopped. Eg. Here is my mission I'll always find a way! Therefore, how do u uncomplicate adaptive software to prevent it from say (in minutes) printing a signal drone chain to fly out and re-establish a link to the/a shut down defense drone which was shut down for safety reasons Do we control printing of all devices, do we destroy drone with eye tech if it re-establishes connection, hmm? All in all, do not doubt A.I. can help all aspects but it needs just as big of a team to tell it not to help when not required/ it's shut down
How to download this presentation?
Email info@sensato.co
Congrats! Awesome!