Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

EP65 Is Your Healthcare Security Healthy? Mandiant Incident Response Insights

EP65 Is Your Healthcare Security Healthy? Mandiant Incident Response Insights

FromCloud Security Podcast by Google


EP65 Is Your Healthcare Security Healthy? Mandiant Incident Response Insights

FromCloud Security Podcast by Google

ratings:
Length:
28 minutes
Released:
May 16, 2022
Format:
Podcast episode

Description

Guests: Charles Carmakal, CTO at Mandiant  Taylor Lehmann, Director at Office of the CISO, Google Cloud Topics: What are the current “popular” incidents at healthcare providers that you handled? Any of them involve cloud?  Do healthcare CISOs have time for anything other than ransomware? Does insider threat matter? What can incident response teach us here? How do you think the threat actors benefit from the health data they steal?  Based on your IR experience, what are the more interesting ways in, other than phishing? Give us your IR-informed take on ransomware pay/not pay focused on healthcare, ideally?  Resources: “The key role ‘visibility’ plays in healthcare’s cybersecurity resilience” “How healthcare can strengthen its own cybersecurity resilience” “M-Trends 2022: Cyber Security Metrics, Insights and Guidance From the Frontlines” “Future of EDR: Is It Reason-able to Suggest XDR?” (ep29) “MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications”“VS21: A Playbook for Resiliency: Contain and Remediate Ransomware Before It Can Act” “FDA Announces Fix for Pacemaker Security Flaws”
Released:
May 16, 2022
Format:
Podcast episode

Titles in the series (100)

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.